First published: Fri Sep 21 2007(Updated: )
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
elinks elinks | <=0.11.1 | |
elinks elinks | <=0.11.2 | |
eLinks | <=0.11.1 | |
eLinks | <=0.11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5034 is classified as a moderate severity vulnerability due to the potential exposure of sensitive data.
To fix CVE-2007-5034, update ELinks to version 0.11.3 or later to ensure HTTPS POST requests do not append sensitive data in cleartext.
Versions of ELinks prior to 0.11.3, specifically 0.11.1 and 0.11.2, are affected by CVE-2007-5034.
CVE-2007-5034 may expose sensitive data from the body and content headers of POST requests sent through a proxy.
Yes, CVE-2007-5034 occurs specifically when ELinks sends POST requests for HTTPS URLs through a proxy.