Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-1620

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2004-1620
Last Modified 05 Sep 2008 04:41:54
Published 21 Oct 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-1620

Summary

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.

Vulnerable Systems

Application

  • S9y Serendipity 0.3

  • S9y Serendipity 0.4

  • S9y Serendipity 0.5

  • S9y Serendipity 0.5 Pl1

  • S9y Serendipity 0.6

  • S9y Serendipity 0.6 Pl1

  • S9y Serendipity 0.6 Pl2

  • S9y Serendipity 0.6 Pl3

  • S9y Serendipity 0.6 Rc1

  • S9y Serendipity 0.6 Rc2

  • S9y Serendipity 0.7 Beta1

  • S9y Serendipity 0.7 Beta2

  • S9y Serendipity 0.7 Beta3

  • S9y Serendipity 0.7 Beta4


References

XF - serendipity-response-splitting(17798)

BID - 11497

CONFIRM - http://www.s9y.org/5.html

SECUNIA - 12909

BUGTRAQ - 20041021 HTTP Response Splitting in Serendipity 0.7-beta4

OSVDB - 11039

OSVDB - 11038

OSVDB - 11013

CONFIRM - http://sourceforge.net/project/shownotes.php?release_id=276694

SECTRACK - 1011864

CONFIRM - http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup

CONFIRM - http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup

CONFIRM - http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup


Last Updated: 27 May 2016 10:39:06