Silverstripe CMS sites through 4.4.4 which have opted into HTTP Cache Headers on responses served by the framework's HTTP layer can be vulnerable to web cache poisoning. Through modifying the X-Original-Url and X-HTTP-Method-Override headers, responses with malicious HTTP headers can return unexpected responses to other consumers of this cached response. Most other headers associated with web cache poisoning are already disabled through request hostname forgery whitelists.
References
Link | Resource |
---|---|
https://www.silverstripe.org/download/security-releases/CVE-2019-19326 | Vendor Advisory |
https://www.silverstripe.org/download/security-releases/CVE-2019-19326 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.silverstripe.org/download/security-releases/CVE-2019-19326 - Vendor Advisory |
Information
Published : 2020-07-15 19:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19326
Mitre link : CVE-2019-19326
CVE.ORG link : CVE-2019-19326
JSON object : View
Products Affected
silverstripe
- silverstripe
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')