CVE-2004-1564
CVSS5.0
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 22:56:35
NMCOE    

[原文]CRLF injection vulnerability in subscribe_thread.php in w-Agora 4.1.6a allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the thread parameter.


[CNNVD]W-Agora多个远程输入验证漏洞(CNNVD-200412-231)

        w-Agora 4.1.6a版本中的subscribe_thread.php存在CRLF注入漏洞。远程攻击者可以借助thread参数完成HTTP Response Splitting攻击以修改来自服务器的预期HTML内容。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1564
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1564
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-231
(官方数据源) CNNVD

- 其它链接及资源

http://lists.grok.org.uk/pipermail/full-disclosure/2004-September/027040.html
(VENDOR_ADVISORY)  FULLDISC  20040930 Multiple vulnerabilities in w-agora forum
http://marc.info/?l=bugtraq&m=109655691512298&w=2
(UNKNOWN)  BUGTRAQ  20040930 Multiple vulnerabilities in w-agora forum
http://securitytracker.com/id?1011463
(UNKNOWN)  SECTRACK  1011463
http://www.securityfocus.com/bid/11283
(UNKNOWN)  BID  11283
http://xforce.iss.net/xforce/xfdb/17558
(UNKNOWN)  XF  wagora-response-splitting(17558)

- 漏洞信息

W-Agora多个远程输入验证漏洞
中危 输入验证
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        w-Agora 4.1.6a版本中的subscribe_thread.php存在CRLF注入漏洞。远程攻击者可以借助thread参数完成HTTP Response Splitting攻击以修改来自服务器的预期HTML内容。

- 公告与补丁

        It is reported that CVS patches are available to address these issues. Please contact the vendor for more information. A link to the W-Agora CVS repository is available in Web references.

- 漏洞信息 (24651)

W-Agora 4.1.6 a subscribe_thread.php HTTP Response Splitting (EDBID:24651)
php webapps
2004-09-30 Verified
0 Alexander Antipov
N/A [点击下载]
source: http://www.securityfocus.com/bid/11283/info
  
Multiple vulnerabilities are reported to affect the application. These issues arise due to insufficient sanitization of user-supplied data. A remote attacker may leverage these vulnerabilities to carry out SQL injection, cross-site scripting, and HTTP response splitting attacks.
  
These issues were identified in W-Agora 4.1.6a, however, it is possible that other versions are also affected.

/subscribe_thread.php?site=support&bn=support_in		

- 漏洞信息

10461
w-Agora subscribe_thread.php HTTP Response Splitting
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

w-Agora contains a flaw that may allow a malicious user to compromise user sessions. The issue due to the "thread" parameter of "subscribe_thread" script insufficently sanitizing user supplied input. By inserting specially crafted HTML/script code, a remote attacker may be able to split the HTTP response, resulting in a loss of integrity.

- 时间线

2004-09-29 Unknow
2004-09-29 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站