First published: Wed Feb 19 2003(Updated: )
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WP Links Page | =0.2.4 | |
WP Links Page | =0.3.2 | |
Linksnet Newsfeed | =0.96 | |
Lynx | =2.8.2_rel1 | |
Lynx | =2.8.3 | |
Lynx | =2.8.3_rel1 | |
Lynx | =2.8.4 | |
Lynx | =2.8.4_rel1 | |
Lynx | =2.8.5_dev8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1405 is considered a moderate severity vulnerability due to its ability to allow HTTP header injection.
To fix CVE-2002-1405, upgrade to Lynx version 2.8.5 or later, which addresses this vulnerability.
CVE-2002-1405 affects Lynx versions 2.8.4 and earlier, including specific versions like 2.8.2_rel1, 2.8.3, and others.
Yes, CVE-2002-1405 can be exploited remotely by attackers injecting malicious HTTP headers through crafted URLs.
CRLF injection in CVE-2002-1405 refers to the ability to inject carriage return and line feed characters into HTTP requests, potentially altering the request's behavior.