First published: Thu Oct 21 2004(Updated: )
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Serendipity (S9Y) Freetag Event | =0.3 | |
Serendipity (S9Y) Freetag Event | =0.4 | |
Serendipity (S9Y) Freetag Event | =0.5 | |
Serendipity (S9Y) Freetag Event | =0.5_pl1 | |
Serendipity (S9Y) Freetag Event | =0.6 | |
Serendipity (S9Y) Freetag Event | =0.6_pl1 | |
Serendipity (S9Y) Freetag Event | =0.6_pl2 | |
Serendipity (S9Y) Freetag Event | =0.6_pl3 | |
Serendipity (S9Y) Freetag Event | =0.6_rc1 | |
Serendipity (S9Y) Freetag Event | =0.6_rc2 | |
Serendipity (S9Y) Freetag Event | =0.7_beta1 | |
Serendipity (S9Y) Freetag Event | =0.7_beta2 | |
Serendipity (S9Y) Freetag Event | =0.7_beta3 | |
Serendipity (S9Y) Freetag Event | =0.7_beta4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2004-1620 is considered to be moderate due to its ability to facilitate HTTP Response Splitting attacks.
To fix CVE-2004-1620, you should upgrade to Serendipity version 0.7rc1 or later.
CVE-2004-1620 affects all Serendipity versions prior to 0.7rc1.
CVE-2004-1620 can be exploited to perform HTTP Response Splitting attacks.
CVE-2004-1620 is found in the url parameter of index.php, exit.php, and the HTTP Referer field in comment.php.