Vulnerability Details : CVE-2004-1620
Potential exploit
CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Products affected by CVE-2004-1620
- cpe:2.3:a:s9y:serendipity:0.6_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1620
1.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1620
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
References for CVE-2004-1620
-
http://sourceforge.net/project/shownotes.php?release_id=276694
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17798
-
http://www.s9y.org/5.html
Exploit;Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=109841283115808&w=2
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/index.php?rev=1.52&view=markup
-
http://securitytracker.com/id?1011864
-
http://www.securityfocus.com/bid/11497
Exploit;Patch;Vendor Advisory
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/exit.php?rev=1.10&view=markup
-
http://cvs.sourceforge.net/viewcvs.py/php-blog/serendipity/comment.php?rev=1.49&view=markup
Jump to