www.eVuln.com advisory:

HTTP Response Splitting in WWWThreads (php version)

Summary: http://evuln.com/vulns/156/summary.html 

Details: http://evuln.com/vulns/156/description.html 



-----------Summary-----------

eVuln ID: EV0156

Software: n/a

Vendor: WWWThreads

Version: 2006.11.25

Critical Level: low

Type: HTTP Response Splitting

Status: Unpatched. No reply from developer(s)

PoC: Available

Solution: Not available

Discovered by: Aliaksandr Hartsuyeu ( http://evuln.com/ )

--------Description--------

$_SERVER["HTTP_REFERER"] value is included in an HTTP response header sent to a 
web user without being validated for malicious characters.

Vulnerable script: reputation.php

--------PoC/Exploit--------

PoC code is available at:

http://evuln.com/vulns/156/exploit.html 

---------Solution----------

Not available

----------Credit-----------

Vulnerability discovered by Aliaksandr Hartsuyeu

http://evuln.com/sql-injection/cookie.html - recent advisories about sql 
injections in cookies

Reply via email to