CRLF injection vulnerability in Bugzilla before 3.2.9, 3.4.x before 3.4.9, 3.6.x before 3.6.3, and 4.0.x before 4.0rc1, when Server Push is enabled in a web browser, allows remote attackers to inject arbitrary HTTP headers and content, and conduct HTTP response splitting attacks, via a crafted URL.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050813.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050820.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050830.html - | |
References | () http://secunia.com/advisories/42271 - Vendor Advisory | |
References | () http://www.bugzilla.org/security/3.2.8/ - Vendor Advisory | |
References | () http://www.securitytracker.com/id?1024683 - | |
References | () http://www.vupen.com/english/advisories/2010/2878 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2010/2975 - Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=600464 - |
Information
Published : 2010-11-05 17:00
Updated : 2024-11-21 01:18
NVD link : CVE-2010-3172
Mitre link : CVE-2010-3172
CVE.ORG link : CVE-2010-3172
JSON object : View
Products Affected
mozilla
- bugzilla
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')