CRLF injection vulnerability in Adobe Acrobat Reader Plugin before 8.0.0, when used with the Microsoft.XMLHTTP ActiveX object in Internet Explorer, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the javascript: URI in the (1) FDF, (2) XML, or (3) XFDF AJAX request parameters.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf - | |
References | () http://lists.suse.com/archive/suse-security-announce/2007-Jan/0012.html - | |
References | () http://secunia.com/advisories/23882 - | |
References | () http://securitytracker.com/id?1017469 - | |
References | () http://www.vupen.com/english/advisories/2007/0032 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/31291 - |
Information
Published : 2007-01-03 21:28
Updated : 2024-11-21 00:24
NVD link : CVE-2007-0047
Mitre link : CVE-2007-0047
CVE.ORG link : CVE-2007-0047
JSON object : View
Products Affected
adobe
- acrobat_reader
CWE