mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/74813 | vdb entry |
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 | vendor advisory |
http://redmine.lighttpd.net/issues/2646 | vendor advisory |
http://www.securitytracker.com/id/1032405 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html | vendor advisory |
http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html | third party advisory exploit |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | third party advisory |
https://kc.mcafee.com/corporate/index?page=content&id=SB10310 |