blob: 7eec8be186eb4b59aaa835b75b622a94505ec68d [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200411-35">
<title>phpWebSite: HTTP response splitting vulnerability</title>
phpWebSite is vulnerable to possible HTTP response splitting attacks.
<product type="ebuild">phpwebsite</product>
<announced>November 26, 2004</announced>
<revised>May 22, 2006: 03</revised>
<package name="www-apps/phpwebsite" auto="yes" arch="*">
<unaffected range="ge">0.9.3_p4-r2</unaffected>
<vulnerable range="lt">0.9.3_p4-r2</vulnerable>
phpWebSite is a web site content management system.
Due to lack of proper input validation, phpWebSite has been found to be
vulnerable to HTTP response splitting attacks.
<impact type="low">
A malicious user could inject arbitrary response data, leading to
content spoofing, web cache poisoning and other cross-site scripting or
HTTP response splitting attacks. This could result in compromising the
victim's data or browser.
There is no known workaround at this time.
All phpWebSite users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/phpwebsite-0.9.3_p4-r2&quot;</code>
<uri link="">BugTraq Posting</uri>
<uri link=";ANN_user_op=view&amp;ANN_id=863">phpWebSite Announcement</uri>
<uri link="">CVE-2004-1516</uri>
<metadata tag="requester" timestamp="Wed, 24 Nov 2004 19:21:49 +0000">
<metadata tag="bugReady" timestamp="Thu, 25 Nov 2004 09:49:35 +0000">
<metadata tag="submitter" timestamp="Fri, 26 Nov 2004 09:12:53 +0000">