Vulnerability Details : CVE-2004-1620
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Exploit prediction scoring system (EPSS) score for CVE-2004-1620
Probability of exploitation activity in the next 30 days: 2.63%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 89 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2004-1620
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
[email protected] |
References for CVE-2004-1620
-
http://sourceforge.net/project/shownotes.php?release_id=276694
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798
-
http://www.s9y.org/5.html
Exploit;Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=109841283115808&w=2
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup
-
http://securitytracker.com/id?1011864
-
http://www.securityfocus.com/bid/11497
Exploit;Patch;Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup
Products affected by CVE-2004-1620
- cpe:2.3:a:s9y:serendipity:0.6_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta1:*:*:*:*:*:*:*