First published: Tue Nov 16 1999(Updated: )
Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lynx | =2.7 | |
Lynx | =2.8 | |
Lynx Project Lynx | =2.7 | |
Lynx Project Lynx | =2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1549 is considered a high severity vulnerability due to its potential for local exploitation and exposure of secure information.
To fix CVE-1999-1549, update Lynx to the latest version that addresses this vulnerability.
CVE-1999-1549 affects Lynx versions 2.7 and 2.8.
CVE-1999-1549 allows a local attacker to read hidden secure form values and modify the user's configuration file.
No, CVE-1999-1549 requires local access to exploit the vulnerability.