Korean
<< Back
VID 21452
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The ViewCVS, according to its version number, has an input validation vulnerability, allowing for cross-site scripting and HTTP response splitting attacks. ViewCVS is a Web browser interface written in the Python programming language for CVS and Subversion version control repositories. ViewCVS versions prior to 1.0.0 is vulnerable to cross-site scripting and HTTP response splitting attacks. A remote attacker may launch cross-site scripting or HTTP response splitting attacks by enticing a victim user to follow a malicious link. This may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the remote ViewCVS software to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/advisories/7729

* Platforms Affected:
Greg Stein, ViewCVS versions prior to 1.0.0
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version of ViewCVS (1.0.0 or later), available from the ViewCVS Project Page at http://viewcvs.sourceforge.net/
Related URL CVE-2004-1062 (CVE)
Related URL 12112 (SecurityFocus)
Related URL 18718 (ISS)