5
CVSSv2

CVE-2002-1405

Published: 19/02/2003 Updated: 18/10/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

CRLF injection vulnerability in Lynx 2.8.4 and previous versions allows remote malicious users to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.

Vulnerable Product Search on Vulmon Subscribe to Product

university of kansas lynx 2.8.2_rel1

university of kansas lynx 2.8.3

elinks elinks 0.3.2

links links 0.96

elinks elinks 0.2.4

university of kansas lynx 2.8.4_rel1

university of kansas lynx 2.8.5_dev8

university of kansas lynx 2.8.3_rel1

university of kansas lynx 2.8.4

Vendor Advisories

lynx (a text-only web browser) did not properly check for illegal characters in all places, including processing of command line options, which could be used to insert extra HTTP headers in a request For Debian GNU/Linux 22/potato this has been fixed in version 283-11 of the lynx package and version 2831-11 of the lynx-ssl package For Deb ...

Exploits

source: wwwsecurityfocuscom/bid/5499/info A CRLF injection vulnerability has been reported for Lynx that may allow an attacker to include extra HTTP headers when viewing web pages If Lynx is called from the command line, carriage return and line feed (CRLF) characters may be included in the specified URL These characters are not escaped ...