HTTP Response Splitting in WWWThreads (php version)

Summary

Vulnerability
HTTP Response Splitting in WWWThreads (php version)
Discovered
2010.11.27
Last Update
n/a n/a
ID
EV0156
CVE
n/a
Risk Level
low
Type
HTTP Response Splitting
Status
Unpatched. Vendor notified. No reply from developer(s).
Vendor
WWWThreads (http://www.wwwthreads.com/)
Vulnerable Software
WWWThreads (php version)
Version
2006.11.25
PoC/Exploit
Available
Solution
Not available
Discovered by
Aliaksandr Hartsuyeu (eVuln.com)

Description

HTTP Response Splitting found in WWWThreads (php version) script.

HTTP Response Splitting
$_SERVER["HTTP_REFERER"] value is included in an HTTP response header sent to a web user without being validated for malicious characters.

Vulnerable script: reputation.php.

PoC/Exploit

HTTP Response Splitting Example.

Vulnerable code: header("Location: ".$_SERVER["HTTP_REFERER"]);

HTTP query ("Referer" field):

Referer: http://some-link/\r\n[second new response]

Solution.

Solution for "HTTP Response Splitting in WWWThreads (php version)" is not available. Check WWWThreads website for updates.