Vulnerability CVE-2007-5034


Published: 2007-09-21   Modified: 2012-02-12

Description:
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Elinks -> Elinks 

 References:
http://bugzilla.elinks.cz/show_bug.cgi?id=937
http://www.debian.org/security/2007/dsa-1380
http://www.redhat.com/support/errata/RHSA-2007-0933.html
http://www.securityfocus.com/archive/1/481606/100/0/threaded
http://www.securityfocus.com/bid/25799
http://www.securitytracker.com/id?1018764
http://www.ubuntu.com/usn/usn-519-1
http://www.vupen.com/english/advisories/2007/3278
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018
https://bugzilla.redhat.com/show_bug.cgi?id=297981
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10335
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00079.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00335.html

Copyright 2024, cxsecurity.com

 

Back to Top