CRLF injection vulnerability in Joomla! before 1.0.13 (aka Sunglow) allows remote attackers to inject arbitrary HTTP headers and probably conduct HTTP response splitting attacks via CRLF sequences in the url parameter. NOTE: this can be leveraged for cross-site scripting (XSS) attacks. NOTE: some of these details are obtained from third party information.
References
Link | Resource |
---|---|
http://osvdb.org/38739 | Broken Link |
http://secunia.com/advisories/26239 | Patch Vendor Advisory |
http://www.joomla.org/content/view/3677/1/ | Vendor Advisory |
http://www.vupen.com/english/advisories/2007/2719 | Third Party Advisory |
http://osvdb.org/38739 | Broken Link |
http://secunia.com/advisories/26239 | Patch Vendor Advisory |
http://www.joomla.org/content/view/3677/1/ | Vendor Advisory |
http://www.vupen.com/english/advisories/2007/2719 | Third Party Advisory |
Configurations
History
21 Nov 2024, 00:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/38739 - Broken Link | |
References | () http://secunia.com/advisories/26239 - Patch, Vendor Advisory | |
References | () http://www.joomla.org/content/view/3677/1/ - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2007/2719 - Third Party Advisory |
Information
Published : 2007-08-08 01:17
Updated : 2024-11-21 00:34
NVD link : CVE-2007-4190
Mitre link : CVE-2007-4190
CVE.ORG link : CVE-2007-4190
JSON object : View
Products Affected
joomla
- joomla\!
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')