CVE-2004-1620 : Detail

CVE-2004-1620

1.44%V3
Network
2005-02-20
04h00 +00:00
2017-07-10
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 24697

Publication date : 2004-10-20 22h00 +00:00
Author : ChaoticEvil
EDB Verified : Yes

source: https://www.securityfocus.com/bid/11497/info Serendipity is reported prone to an HTTP response splitting vulnerability. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted. This issue is identified in Serendipity 0.7-beta4 and prior. http://www.example.com/serendipity/exit.php?url=DQpDb25uZWN0aW9uOiBLZWVwLUFsaXZlDQpDb 250ZW50LUxlbmd0aDogMA0KDQpIVFRQLzEuMCAyMDAgT0sNCkNvbnRlbnQtTGVuZ3RoOiAyMQ0KQ 29udGVudC1UeXBlOiB0ZXh0L2h0bWwNCg0KPGh0bWw%2bKmRlZmFjZWQqPC9odG1sPg%3d%3d

Products Mentioned

Configuraton 0

S9y>>Serendipity >> Version 0.3

S9y>>Serendipity >> Version 0.4

S9y>>Serendipity >> Version 0.5

    S9y>>Serendipity >> Version 0.5_pl1

      S9y>>Serendipity >> Version 0.6

        S9y>>Serendipity >> Version 0.6_pl1

          S9y>>Serendipity >> Version 0.6_pl2

            S9y>>Serendipity >> Version 0.6_pl3

              S9y>>Serendipity >> Version 0.6_rc1

                S9y>>Serendipity >> Version 0.6_rc2

                  S9y>>Serendipity >> Version 0.7_beta1

                    S9y>>Serendipity >> Version 0.7_beta2

                      S9y>>Serendipity >> Version 0.7_beta3

                        S9y>>Serendipity >> Version 0.7_beta4

                          References

                          http://marc.info/?l=bugtraq&m=109841283115808&w=2
                          Tags : mailing-list, x_refsource_BUGTRAQ
                          http://www.s9y.org/5.html
                          Tags : x_refsource_CONFIRM
                          http://www.securityfocus.com/bid/11497
                          Tags : vdb-entry, x_refsource_BID
                          http://www.osvdb.org/11039
                          Tags : vdb-entry, x_refsource_OSVDB
                          http://securitytracker.com/id?1011864
                          Tags : vdb-entry, x_refsource_SECTRACK
                          http://www.osvdb.org/11038
                          Tags : vdb-entry, x_refsource_OSVDB
                          http://secunia.com/advisories/12909/
                          Tags : third-party-advisory, x_refsource_SECUNIA
                          http://www.osvdb.org/11013
                          Tags : vdb-entry, x_refsource_OSVDB