First published: Sat Dec 31 2005(Updated: )
viewcvs in ViewCVS 0.9.2 allows remote attackers to set the Content-Type header to arbitrary values via the content-type parameter, which can be leveraged for cross-site scripting (XSS) and other attacks, as demonstrated using (1) "text/html", or (2) "image/jpeg" with an image that is rendered as HTML by Internet Explorer, a different vulnerability than CVE-2004-1062. NOTE: it was later reported that 0.9.4 is also affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ViewCVS | =0.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4831 is classified as a moderate severity vulnerability due to its potential for cross-site scripting (XSS) exploitation.
To fix CVE-2005-4831, update ViewCVS to a version that addresses this vulnerability or implement input validation for the content-type parameter.
ViewCVS version 0.9.2 is the only affected version for CVE-2005-4831.
CVE-2005-4831 can facilitate cross-site scripting (XSS) and potentially other types of attacks due to arbitrary Content-Type header manipulation.
Yes, CVE-2005-4831 has known demonstration exploits that show how the vulnerability can be leveraged in attacks.