| VID |
21381 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Serendipity, according to the version number, is vulnerable to a HTTP Response Splitting Attack. Serendipity is a Weblog/blog system used with PHP. Serendipity versions prior to 0.7-rc1 are vulnerable to a HTTP Response Splitting Attack, caused by improper processing of the requested URI in the 'index.php', 'comments.php', 'exit.php' scripts. By sending a specially-crafted request, a remote attacker could cause the server to return a split response. It would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information.
* Note: This check solely relied on the version number of the Serendipity on the remote web server to assess this vulnerability, so this might be a false positive.
* References: http://securitytracker.com/alerts/2004/Oct/1011864.html http://www.osvdb.org/displayvuln.php?osvdb_id=11039 http://www.osvdb.org/displayvuln.php?osvdb_id=11038 http://www.osvdb.org/displayvuln.php?osvdb_id=11013
* Platforms Affected: S9y, Serendipity prior to 0.7-rc1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Serendipity (0.7-rc1 or later) fixed this issue, available from the SourceForge.net Web site at http://sourceforge.net/projects/php-blog/ |
| Related URL |
CVE-2004-1620 (CVE) |
| Related URL |
11497 (SecurityFocus) |
| Related URL |
17798 (ISS) |
|