CVE-2004-1620

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
References
Link Resource
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup
http://marc.info/?l=bugtraq&m=109841283115808&w=2
http://secunia.com/advisories/12909/ Exploit Patch Vendor Advisory
http://securitytracker.com/id?1011864
http://sourceforge.net/project/shownotes.php?release_id=276694
http://www.osvdb.org/11013
http://www.osvdb.org/11038
http://www.osvdb.org/11039
http://www.s9y.org/5.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/11497 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup
http://marc.info/?l=bugtraq&m=109841283115808&w=2
http://secunia.com/advisories/12909/ Exploit Patch Vendor Advisory
http://securitytracker.com/id?1011864
http://sourceforge.net/project/shownotes.php?release_id=276694
http://www.osvdb.org/11013
http://www.osvdb.org/11038
http://www.osvdb.org/11039
http://www.s9y.org/5.html Exploit Patch Vendor Advisory
http://www.securityfocus.com/bid/11497 Exploit Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.5:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.5_pl1:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6_pl1:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6_pl2:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6_pl3:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.6_rc2:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.7_beta1:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.7_beta2:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.7_beta3:*:*:*:*:*:*:*
cpe:2.3:a:s9y:serendipity:0.7_beta4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:51

Type Values Removed Values Added
References () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup - () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup -
References () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup - () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup -
References () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup - () http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup -
References () http://marc.info/?l=bugtraq&m=109841283115808&w=2 - () http://marc.info/?l=bugtraq&m=109841283115808&w=2 -
References () http://secunia.com/advisories/12909/ - Exploit, Patch, Vendor Advisory () http://secunia.com/advisories/12909/ - Exploit, Patch, Vendor Advisory
References () http://securitytracker.com/id?1011864 - () http://securitytracker.com/id?1011864 -
References () http://sourceforge.net/project/shownotes.php?release_id=276694 - () http://sourceforge.net/project/shownotes.php?release_id=276694 -
References () http://www.osvdb.org/11013 - () http://www.osvdb.org/11013 -
References () http://www.osvdb.org/11038 - () http://www.osvdb.org/11038 -
References () http://www.osvdb.org/11039 - () http://www.osvdb.org/11039 -
References () http://www.s9y.org/5.html - Exploit, Patch, Vendor Advisory () http://www.s9y.org/5.html - Exploit, Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/11497 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/11497 - Exploit, Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/17798 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/17798 -

Information

Published : 2004-10-21 04:00

Updated : 2024-11-20 23:51


NVD link : CVE-2004-1620

Mitre link : CVE-2004-1620

CVE.ORG link : CVE-2004-1620


JSON object : View

Products Affected

s9y

  • serendipity