Description
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
Remediation
References
Related Vulnerabilities
WordPress Plugin Portfolio Cross-Site Request Forgery (1.0)
phpMyAdmin Other Vulnerability (CVE-2005-0544)
Drupal Core 9.3.x Multiple Vulnerabilities (9.3.0 - 9.3.7)
WordPress Plugin VikBooking Hotel Booking Engine & PMS Multiple Vulnerabilities (1.5.7)
Ruby on Rails Improper Authentication Vulnerability (CVE-2012-3424)