Описание
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2015-3200
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375
- https://kc.mcafee.com/corporate/index?page=content&id=SB10310
- http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html
- http://redmine.lighttpd.net/issues/2646
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.securityfocus.com/bid/74813
- http://www.securitytracker.com/id/1032405
Связанные уязвимости
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
mod_auth in lighttpd before 1.4.36 allows remote attackers to inject a ...
Уязвимость компонента Log File Handler модуля mod_auth веб-сервера lighttpd, позволяющая нарушителю получить доступ на изменение записей в журнале