Rapid7 Vulnerability & Exploit Database

PHP fopen() CRLF Injection Vulnerability

Back to Search

PHP fopen() CRLF Injection Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
12/31/2002
Created
07/25/2018
Added
11/01/2004
Modified
05/27/2016

Description

The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote attackers to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."

Solution(s)

  • php-upgrade-4_3_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;