Korean
<< Back
VID 21381
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Serendipity, according to the version number, is vulnerable to a HTTP Response Splitting Attack.
Serendipity is a Weblog/blog system used with PHP. Serendipity versions prior to 0.7-rc1 are vulnerable to a HTTP Response Splitting Attack, caused by improper processing of the requested URI in the 'index.php', 'comments.php', 'exit.php' scripts. By sending a specially-crafted request, a remote attacker could cause the server to return a split response. It would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information.

* Note: This check solely relied on the version number of the Serendipity on the remote web server to assess this vulnerability, so this might be a false positive.

* References:
http://securitytracker.com/alerts/2004/Oct/1011864.html
http://www.osvdb.org/displayvuln.php?osvdb_id=11039
http://www.osvdb.org/displayvuln.php?osvdb_id=11038
http://www.osvdb.org/displayvuln.php?osvdb_id=11013

* Platforms Affected:
S9y, Serendipity prior to 0.7-rc1
Any operating system Any version
Recommendation Upgrade to the latest version of Serendipity (0.7-rc1 or later) fixed this issue, available from the SourceForge.net Web site at http://sourceforge.net/projects/php-blog/
Related URL CVE-2004-1620 (CVE)
Related URL 11497 (SecurityFocus)
Related URL 17798 (ISS)