www.eVuln.com : HTTP Response Splitting in WWWThreads (php version)

2010-12-12T00:00:00
ID SECURITYVULNS:DOC:25286
Type securityvulns
Reporter Securityvulns
Modified 2010-12-12T00:00:00

Description

www.eVuln.com advisory: HTTP Response Splitting in WWWThreads (php version) Summary: http://evuln.com/vulns/156/summary.html Details: http://evuln.com/vulns/156/description.html

-----------Summary----------- eVuln ID: EV0156 Software: n/a Vendor: WWWThreads Version: 2006.11.25 Critical Level: low Type: HTTP Response Splitting Status: Unpatched. No reply from developer(s) PoC: Available Solution: Not available Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ ) --------Description-------- $_SERVER["HTTP_REFERER"] value is included in an HTTP response header sent to a web user without being validated for malicious characters. Vulnerable script: reputation.php --------PoC/Exploit-------- PoC code is available at: http://evuln.com/vulns/156/exploit.html ---------Solution---------- Not available ----------Credit----------- Vulnerability discovered by Aliaksandr Hartsuyeu http://evuln.com/sql-injection/cookie.html - recent advisories about sql injections in cookies