Информационная безопасность
[RU] switch to English


Дополнительная информация

  Cводка уязвимостей безопасности в Web-приложениях (PHP, ASP, JSP, CGI, Perl)

  [security bulletin] HPSBMI02614 SSRT100344 rev.1 - HP webOS Contacts Application, Remote Execution of Arbitrary Code

  Novell Vibe 3 BETA OnPrem Stored Cross-site Scripting Vulnerability

  Multiple XSS in Solarwinds Orion NPM 10.1

  www.eVuln.com : Non-persistent XSS in WWWThreads (perl version)

From:Aliaksandr Hartsuyeu <bt_(at)_evuln.com>
Date:12 декабря 2010 г.
Subject:www.eVuln.com : HTTP Response Splitting in WWWThreads (php version)

www.eVuln.com advisory:
HTTP Response Splitting in WWWThreads (php version)
Summary: http://evuln.com/vulns/156/summary.html
Details: http://evuln.com/vulns/156/description.html

-----------Summary-----------
eVuln ID: EV0156
Software: n/a
Vendor: WWWThreads
Version: 2006.11.25
Critical Level: low
Type: HTTP Response Splitting
Status: Unpatched. No reply from developer(s)
PoC: Available
Solution: Not available
Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )
--------Description--------
$_SERVER["HTTP_REFERER"] value is included in an HTTP response header sent to a
web user without being validated for malicious characters.
Vulnerable script: reputation.php
--------PoC/Exploit--------
PoC code is available at:
http://evuln.com/vulns/156/exploit.html
---------Solution----------
Not available
----------Credit-----------
Vulnerability discovered by Aliaksandr Hartsuyeu
http://evuln.com/sql-injection/cookie.html - recent advisories about sql
injections in cookies

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород