mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
References
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html - Exploit, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html - | |
References | () http://redmine.lighttpd.net/issues/2646 - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74813 - | |
References | () http://www.securitytracker.com/id/1032405 - VDB Entry | |
References | () https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375 - Vendor Advisory | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10310 - |
Information
Published : 2015-06-09 14:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-3200
Mitre link : CVE-2015-3200
CVE.ORG link : CVE-2015-3200
JSON object : View
Products Affected
oracle
- solaris
hp
- virtual_customer_access_system
lighttpd
- lighttpd
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')