Vulnerability Name:

CVE-2007-1900 (CCN-33510)

Assigned:2007-04-07
Published:2007-04-07
Updated:2017-10-11
Summary:CRLF injection vulnerability in the FILTER_VALIDATE_EMAIL filter in ext/filter in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to inject arbitrary e-mail headers via an e-mail address with a '\n' character, which causes a regular expression to ignore the subsequent part of the address string.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2007-1900

Source: CCN
Type: HP Security Bulletin HPSBUX02262 SSRT071447
HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS)

Source: HP
Type: UNKNOWN
SSRT071447

Source: CCN
Type: SA24824
PHP "FILTER_VALIDATE_EMAIL" Filter Newline Injection

Source: SECUNIA
Type: Vendor Advisory
24824

Source: SECUNIA
Type: UNKNOWN
25056

Source: SECUNIA
Type: UNKNOWN
25057

Source: SECUNIA
Type: UNKNOWN
25062

Source: SECUNIA
Type: UNKNOWN
25445

Source: SECUNIA
Type: UNKNOWN
25535

Source: SECUNIA
Type: UNKNOWN
26231

Source: SECUNIA
Type: UNKNOWN
27037

Source: SECUNIA
Type: UNKNOWN
27102

Source: SECUNIA
Type: UNKNOWN
27110

Source: GENTOO
Type: UNKNOWN
GLSA-200705-19

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-152-01

Source: CCN
Type: ASA-2007-416
HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS) (HPSBUX02262)

Source: DEBIAN
Type: UNKNOWN
DSA-1283

Source: DEBIAN
Type: DSA-1283
php5 -- several vulnerabilities

Source: CCN
Type: GLSA-200705-19
PHP: Multiple vulnerabilities

Source: CCN
Type: GLSA-200710-02
PHP: Multiple vulnerabilities

Source: GENTOO
Type: UNKNOWN
GLSA-200710-02

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:032

Source: OSVDB
Type: UNKNOWN
33962

Source: CCN
Type: OSVDB ID: 33962
PHP ext/filter FILTER_VALIDATE_EMAIL Newline Injection

Source: CCN
Type: PMOPB-45-2007
PHP ext/filter Email Validation Vulnerability

Source: MISC
Type: Vendor Advisory
http://www.php-security.org/MOPB/PMOPB-45-2007.html

Source: CCN
Type: PHP Web site
PHP 5.2.3 Release Announcement

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/releases/5_2_3.php

Source: BID
Type: UNKNOWN
23359

Source: CCN
Type: BID-23359
PHP Filter_Var FILTER_VALIDATE_EMAIL Newline Injection Vulnerability

Source: TRUSTIX
Type: UNKNOWN
2007-0023

Source: CCN
Type: USN-455-1
PHP vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-455-1

Source: VUPEN
Type: UNKNOWN
ADV-2007-2016

Source: VUPEN
Type: UNKNOWN
ADV-2007-3386

Source: XF
Type: UNKNOWN
php-filtervalidateemail-header-injection(33510)

Source: XF
Type: UNKNOWN
php-filtervalidateemail-header-injection(33510)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:6067

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-2215

Source: SUSE
Type: SUSE-SA:2007:032
PHP security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:6067
    V
    HP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS)
    2015-04-20
    oval:org.mitre.oval:def:19944
    P
    DSA-1283-1 php5
    2014-06-23
    oval:org.opensuse.security:def:20071900
    V
    CVE-2007-1900
    2012-07-03
    oval:org.debian:def:1283
    V
    several vulnerabilities
    2007-04-29
    BACK
    php php 5.2.0
    php php 5.2.1
    php php 5.2.0
    php php 5.2.1
    gentoo linux *
    hp hp-ux b.11.11
    hp hp-ux b.11.23
    mandrakesoft mandrake linux corporate server 3.0
    debian debian linux 3.1
    novell open enterprise server *
    mandrakesoft mandrake multi network firewall 2.0
    canonical ubuntu 6.06
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    hp hp-ux b.11.31
    mandrakesoft mandrake linux 2007.1
    novell open enterprise server *
    novell opensuse 10.2