CVE-2007-1900
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
10/04/2007
Última modificación:
09/04/2025
Descripción
Vulnerabilidad de inyección CRLF (retorno de carro y nueva línea) en el filtro FILTER_VALIDATE_EMAIL en ext/filter de PHP 5.2.0 y 5.2.1 permite a atacantes locales o remotos dependiendo del contexto inyectar cabeceras de correo electrónico de su elección mediante una dirección de correo con un carácter '\n', lo cual provoca que una expresión regular ignore la correspondiente parte de la cadena de dirección.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
- http://secunia.com/advisories/24824
- http://secunia.com/advisories/25056
- http://secunia.com/advisories/25057
- http://secunia.com/advisories/25062
- http://secunia.com/advisories/25445
- http://secunia.com/advisories/25535
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/27037
- http://secunia.com/advisories/27102
- http://secunia.com/advisories/27110
- http://security.gentoo.org/glsa/glsa-200705-19.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
- http://www.debian.org/security/2007/dsa-1283
- http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
- http://www.novell.com/linux/security/advisories/2007_32_php.html
- http://www.osvdb.org/33962
- http://www.php-security.org/MOPB/PMOPB-45-2007.html
- http://www.php.net/releases/5_2_3.php
- http://www.securityfocus.com/bid/23359
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-455-1
- http://www.vupen.com/english/advisories/2007/2016
- http://www.vupen.com/english/advisories/2007/3386
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33510
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
- http://secunia.com/advisories/24824
- http://secunia.com/advisories/25056
- http://secunia.com/advisories/25057
- http://secunia.com/advisories/25062
- http://secunia.com/advisories/25445
- http://secunia.com/advisories/25535
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/27037
- http://secunia.com/advisories/27102
- http://secunia.com/advisories/27110
- http://security.gentoo.org/glsa/glsa-200705-19.xml
- http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
- http://www.debian.org/security/2007/dsa-1283
- http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
- http://www.novell.com/linux/security/advisories/2007_32_php.html
- http://www.osvdb.org/33962
- http://www.php-security.org/MOPB/PMOPB-45-2007.html
- http://www.php.net/releases/5_2_3.php
- http://www.securityfocus.com/bid/23359
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-455-1
- http://www.vupen.com/english/advisories/2007/2016
- http://www.vupen.com/english/advisories/2007/3386
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33510
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6067
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html



