5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
6.8 Medium
AI Score
Confidence
High
0.026 Low
EPSS
Percentile
90.4%
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup
cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup
cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup
marc.info/?l=bugtraq&m=109841283115808&w=2
secunia.com/advisories/12909/
securitytracker.com/id?1011864
sourceforge.net/project/shownotes.php?release_id=276694
www.osvdb.org/11013
www.osvdb.org/11038
www.osvdb.org/11039
www.s9y.org/5.html
www.securityfocus.com/bid/11497
exchange.xforce.ibmcloud.com/vulnerabilities/17798