CVE-2004-1656
CVSS5.0
发布时间 :2004-09-01 00:00:00
修订时间 :2016-10-17 22:58:32
NMCOE    

[原文]CRLF injection vulnerability in Comersus Shopping Cart 5.0991 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the redirecturl parameter.


[CNNVD]Comersus Cart HTTP响应拆分攻击漏洞(CNNVD-200409-004)

        Comersus Shopping Cart 5.0991版本存在CRLF注入漏洞。远程攻击者借助redirecturl参数执行HTTP响应拆分攻击修改服务器期望HTML内容。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1656
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1656
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200409-004
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=109405777905519&w=2
(UNKNOWN)  BUGTRAQ  20040901 ADVISORY: http response splitting hole in Comersus shopping cart
http://www.securityfocus.com/bid/11083
(VENDOR_ADVISORY)  BID  11083
http://xforce.iss.net/xforce/xfdb/17201
(VENDOR_ADVISORY)  XF  comersus-cart-response-splitting(17201)

- 漏洞信息

Comersus Cart HTTP响应拆分攻击漏洞
中危 输入验证
2004-09-01 00:00:00 2005-10-20 00:00:00
远程  
        Comersus Shopping Cart 5.0991版本存在CRLF注入漏洞。远程攻击者借助redirecturl参数执行HTTP响应拆分攻击修改服务器期望HTML内容。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (24422)

Comersus Cart 5.0 HTTP Response Splitting Vulnerability (EDBID:24422)
asp webapps
2004-09-01 Verified
0 Maestro De-Seguridad
N/A [点击下载]
source: http://www.securityfocus.com/bid/11083/info

Comersus Cart is reported prone to a HTTP response splitting vulnerability. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted. This could aid in various attacks, which try to entice client users into a false sense of trust.

This issue was identified in Comersus Shopping Cart 5.0991, however, other versions may be affected as well. 

http://www.example.com/path_to_comersus/comersus_customerLoggedVerify.asp?

redirecturl=%0d%0a%0d%0aHTTP/1.0%20200%20OK%0d%0aContent-Type:%20text/html%0d%0aContent-L

ength:%2028%0d%0a%0d%0a{html}0wned%20by%20me{/html}


		

- 漏洞信息

9524
Comersus ASP Shopping Cart redirecturl HTTP Response Splitting
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Comersus Shopping Cart contains a flaw that may allow a malicious user to conduct a HTTP response splitting attack. The issue is triggered when a malicious user submits a specially crafted url to the 'redirecturl' parameter. It is possible that the flaw may allow a remote attacker to display arbitrary content on the server resulting in a loss of integrity.

- 时间线

2004-08-31 Unknow
2004-08-31 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站