SQWebmail HTTP响应拆分漏洞

SQWebmail HTTP响应拆分漏洞

漏洞ID 1108677 漏洞类型 输入验证
发布时间 2005-04-15 更新时间 2005-10-20
图片[1]-SQWebmail HTTP响应拆分漏洞-安全小百科CVE编号 CVE-2005-1308
图片[2]-SQWebmail HTTP响应拆分漏洞-安全小百科CNNVD-ID CNNVD-200504-067
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/25534
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200504-067
|漏洞详情
SqWebMail是使用Maildir邮箱发送和接收邮件的webCGI客户端。SqWebMail使得远程攻击者可以通过在一个重定向参数内的CRLF序列并跟着一个所期望的脚本或HTML来注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/13374/info

SQWebmail is prone to a HTTP response splitting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how Web content is served, cached or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust. 

sqwebmail?redirect=%0d%0a%0d%0a[INJECT SCRIPT]
|参考资料

来源:BID
名称:13374
链接:http://www.securityfocus.com/bid/13374
来源:SECUNIA
名称:15119
链接:http://secunia.com/advisories/15119

相关推荐: HP-UX setrlimit() Incorrect Core Processing Vulnerability

HP-UX setrlimit() Incorrect Core Processing Vulnerability 漏洞ID 1103080 漏洞类型 Design Error 发布时间 2001-07-02 更新时间 2001-07-02 CVE编号 N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享