First published: Fri Aug 06 2021(Updated: )
Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lynx | 2.8.9rel.1-3+deb10u1 2.9.0dev.6-3~deb11u1 2.9.0dev.12-1 | |
debian/lynx-cur | <=2.8.9dev1-2+deb8u1 | |
debian/lynx | <=2.8.9rel.1-3<=2.8.9dev11-1<=2.9.0dev.8-1<=2.9.0dev.6-2 | 2.9.0dev.9-1 2.9.0dev.6-3 2.9.0dev.6-3~deb11u1 2.8.9rel.1-3+deb10u1 |
Lynx Project Lynx | <=2.8.9 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-38165.
The severity of CVE-2021-38165 is medium with a CVSS score of 5.3.
The affected software is Lynx versions 2.8.9 and prior.
Remote attackers can exploit CVE-2021-38165 by discovering cleartext credentials through the mishandling of the userinfo subcomponent of a URI.
Yes, there are references available for CVE-2021-38165. You can find them at the following links: [link1](http://www.openwall.com/lists/oss-security/2021/08/07/11), [link2](http://www.openwall.com/lists/oss-security/2021/08/07/12), [link3](http://www.openwall.com/lists/oss-security/2021/08/07/9).