CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=109841283115808&w=2 | mailing list |
http://www.s9y.org/5.html | exploit patch vendor advisory |
http://www.securityfocus.com/bid/11497 | exploit vdb entry patch vendor advisory |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup | |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798 | vdb entry |
http://www.osvdb.org/11039 | vdb entry |
http://securitytracker.com/id?1011864 | vdb entry |
http://www.osvdb.org/11038 | vdb entry |
http://secunia.com/advisories/12909/ | exploit third party advisory patch vendor advisory |
http://sourceforge.net/project/shownotes.php?release_id=276694 | |
http://www.osvdb.org/11013 | vdb entry |
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup |