You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
As #81518, and #81680 (Still not fixed), from, user_agent ini value can lead CrLf injection and may lead HTTP header injection in fopen's http wrapper.
Listening on 0.0.0.0 1337
Connection received on 127.0.0.1 54468
GET / HTTP/1.1
From: invalid_from
Test-1: first_line
Host: localhost:1337
Connection: close
User-Agent: invalid_ua
Test-2: another_line
But I expected this output instead:
Either sanitized or blocked at ini value level
GET / HTTP/1.1
From: invalid_fromTest-1: first_line
Host: localhost:1337
Connection: close
User-Agent: invalid_uaTest-2: another_line
PHP Version
All PHP releases (including 8.5.0-dev)
Operating System
No response
The text was updated successfully, but these errors were encountered:
mdsnins
changed the title
Cr-Lf injection could be happen via From, User-Agent ini settings
Cr-Lf injection could be happend via From, User-Agent ini settings
Mar 5, 2025
Description
As #81518, and #81680 (Still not fixed),
from
,user_agent
ini value can lead CrLf injection and may lead HTTP header injection in fopen's http wrapper.The following code:
Resulted in this output: (Receiver)
But I expected this output instead:
Either sanitized or blocked at ini value level
PHP Version
All PHP releases (including 8.5.0-dev)
Operating System
No response
The text was updated successfully, but these errors were encountered: