NX5Linkx 'Links.PHP' HTTP跨站脚本请求伪造漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111013 漏洞类型 输入验证
发布时间 2006-09-13 更新时间 2006-09-14
CVE编号 CVE-2006-4505 CNNVD-ID CNNVD-200608-485
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28568
https://www.securityfocus.com/bid/20011
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-485
|漏洞详情
NX5Linx1.0的links.php脚本存在CRLF注入漏洞,远程攻击者可借助url参数中的CRLF序列注入任意HTTP头并发起HTTP响应拆分攻击。
|漏洞EXP
source: http://www.securityfocus.com/bid/20011/info

NX5Linkx is prone to an HTTP response-splitting vulnerability because the application fails to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

http://www.example.com% 0D%0A%0D%0AHTTP/1.0 200 OK%0D%0A%0D% 0A.......
|受影响的产品
NX5 NX5Linkx 1.0
|参考资料

来源:MISC
链接:http://www.evuln.com/vulns/138/
来源:XF
名称:nx5linkx-link-response-splitting(28634)
链接:http://xforce.iss.net/xforce/xfdb/28634
来源:BID
名称:20011
链接:http://www.securityfocus.com/bid/20011
来源:BUGTRAQ
名称:20060912[eVuln]NX5LinkxMultipleVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/445916/100/0/threaded
来源:VUPEN
名称:ADV-2006-3631
链接:http://www.frsirt.com/english/advisories/2006/3631
来源:SECUNIA
名称:21922
链接:http://secunia.com/advisories/21922