CRLF injection vulnerability in Serendipity before 0.7rc1 allows remote attackers to perform HTTP Response Splitting attacks to modify expected HTML content from the server via the url parameter in (1) index.php and (2) exit.php, or (3) the HTTP Referer field in comment.php.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Serendipity | S9y | 0.3 (including) | 0.3 (including) |
Serendipity | S9y | 0.4 (including) | 0.4 (including) |
Serendipity | S9y | 0.5 (including) | 0.5 (including) |
Serendipity | S9y | 0.5_pl1 (including) | 0.5_pl1 (including) |
Serendipity | S9y | 0.6 (including) | 0.6 (including) |
Serendipity | S9y | 0.6_pl1 (including) | 0.6_pl1 (including) |
Serendipity | S9y | 0.6_pl2 (including) | 0.6_pl2 (including) |
Serendipity | S9y | 0.6_pl3 (including) | 0.6_pl3 (including) |
Serendipity | S9y | 0.6_rc1 (including) | 0.6_rc1 (including) |
Serendipity | S9y | 0.6_rc2 (including) | 0.6_rc2 (including) |
Serendipity | S9y | 0.7_beta1 (including) | 0.7_beta1 (including) |
Serendipity | S9y | 0.7_beta2 (including) | 0.7_beta2 (including) |
Serendipity | S9y | 0.7_beta3 (including) | 0.7_beta3 (including) |
Serendipity | S9y | 0.7_beta4 (including) | 0.7_beta4 (including) |