Lucene search

K
gentooGentoo FoundationGLSA-200409-23
HistorySep 17, 2004 - 12:00 a.m.

SnipSnap: HTTP response splitting

2004-09-1700:00:00
Gentoo Foundation
security.gentoo.org
12

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.027

Percentile

90.7%

Background

SnipSnap is a user friendly content management system with features such as wiki and weblog.

Description

SnipSnap contains various HTTP response splitting vulnerabilities that could potentially compromise the sites data. Some of these attacks include web cache poisoning, cross-user defacement, hijacking pages with sensitive user information, and cross-site scripting. This vulnerability is due to the lack of illegal input checking in the software.

Impact

A malicious user could inject and execute arbitrary script code, potentially compromising the victim’s data or browser.

Workaround

There is no known workaround at this time.

Resolution

All SnipSnap users should upgrade to the latest version:

 # emerge sync
 
 # emerge -pv ">=dev-java/snipsnap-bin-1.0_beta1"
 # emerge ">=dev-java/snipsnap-bin-1.0beta1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-java/snipsnap-bin< 1.0_beta1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.027

Percentile

90.7%