Vulnerability Name:

CVE-2002-1783 (CCN-10080)

Assigned:2002-09-09
Published:2002-09-09
Updated:2017-07-11
Summary:CRLF injection vulnerability in PHP 4.2.1 through 4.2.3, when allow_url_fopen is enabled, allows remote attackers to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Mon May 06 2002 - 17:12:10 CDT
CRLF Injection

Source: BUGTRAQ
Type: Vendor Advisory
20020909 PHP fopen() CRLF Injection

Source: CCN
Type: BugTraq Mailing List, Mon Sep 09 2002 - 16:23:01 CDT
PHP fopen() CRLF Injection

Source: BUGTRAQ
Type: Patch
20020912 Re: PHP fopen() CRLF Injection

Source: CCN
Type: BugTraq Mailing List, Thu Sep 12 2002 - 11:32:36 CDT
Re: PHP fopen() CRLF Injection

Source: MITRE
Type: CNA
CVE-2002-1783

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-168

Source: DEBIAN
Type: DSA-168
php -- bypassing safe_mode

Source: CCN
Type: OSVDB ID: 59760
PHP fopen / file Functions CRLF Injection

Source: CCN
Type: PHP Group Web site
PHP: Hypertext Preprocessor

Source: BID
Type: Patch
5681

Source: CCN
Type: BID-5681
PHP Function CRLF Injection Vulnerability

Source: XF
Type: UNKNOWN
php-fopen-crlf-injection(10080)

Source: XF
Type: UNKNOWN
php-fopen-crlf-injection(10080)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:3.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.16:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.17:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:3.0.18:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:168
    V
    bypassing safe_mode, CRLF injection
    2002-09-18
    BACK
    php php 3.0.14
    php php 3.0.15
    php php 3.0.16
    php php 3.0.17
    php php 3.0.18
    php php 4.0.3
    php php 4.0.4
    php php 4.0.5
    php php 4.0.6
    php php 4.0.7
    php php 4.1.0
    php php 4.1.1
    php php 4.1.2
    php php 4.2.0
    php php 4.2.1
    php php 4.2.2
    php php 4.2.3
    php php 4.2.1 -
    php php 4.2.3 -
    php php 4.2.2
    debian debian linux 2.2
    debian debian linux 3.0