Multiple HTTP Response Splitting vulnerabilities in osCommerce 2.2 Milestone 2 and earlier allow remote attackers to spoof web content and poison web caches via hex-encoded CRLF ("%0d%0a") sequences in the (1) products_id or (2) pid parameter to index.php or (3) goto parameter to banner.php.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=111842744205117&w=2 | mailing list |
http://secunia.com/advisories/15670 | third party advisory |
http://marc.info/?l=bugtraq&m=111936255011735&w=2 | mailing list |
http://www.gulftech.org/?node=research&article_id=00080-06102005 | |
http://www.securityfocus.com/bid/13979 | vdb entry |