CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://marc.info/?l=bugtraq&m=109841283115808&w=2 | mailing-list x_refsource_BUGTRAQ |
http://www.s9y.org/5.html | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/11497 | vdb-entry x_refsource_BID |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup | x_refsource_CONFIRM |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup | x_refsource_CONFIRM |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798 | vdb-entry x_refsource_XF |
http://www.osvdb.org/11039 | vdb-entry x_refsource_OSVDB |
http://securitytracker.com/id?1011864 | vdb-entry x_refsource_SECTRACK |
http://www.osvdb.org/11038 | vdb-entry x_refsource_OSVDB |
http://secunia.com/advisories/12909/ | third-party-advisory x_refsource_SECUNIA |
http://sourceforge.net/project/shownotes.php?release_id=276694 | x_refsource_CONFIRM |
http://www.osvdb.org/11013 | vdb-entry x_refsource_OSVDB |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |
In Serendipity before 2.0.5, an attacker can bypass SSRF protection by using a malformed IP address (e.g., http://127.1) or a 30x (aka Redirection) HTTP status code.