HTTP Response Splitting in WWWThreads (php version)
Summary
- Vulnerability
- HTTP Response Splitting in WWWThreads (php version)
- Discovered
- 2010.11.27
- Last Update
- n/a n/a
- ID
- EV0156
- CVE
- n/a
- Risk Level
- low
- Type
- HTTP Response Splitting
- Status
- Unpatched. Vendor notified. No reply from developer(s).
- Vendor
- WWWThreads (http://www.wwwthreads.com/)
- Vulnerable Software
- WWWThreads (php version)
- Version
- 2006.11.25
- PoC/Exploit
- Available
- Solution
- Not available
- Discovered by
- Aliaksandr Hartsuyeu (eVuln.com)
Description
HTTP Response Splitting found in WWWThreads (php version) script.
- HTTP Response Splitting
- $_SERVER["HTTP_REFERER"] value is included in an HTTP response header sent to a web user without being validated for malicious characters.
Vulnerable script: reputation.php.
PoC/Exploit
HTTP Response Splitting Example.
Vulnerable code: header("Location: ".$_SERVER["HTTP_REFERER"]);
HTTP query ("Referer" field):
Referer: http://some-link/\r\n[second new response]
Solution.
Solution for "HTTP Response Splitting in WWWThreads (php version)" is not available. Check WWWThreads website for updates.