SnipSnap < 1.0b1 POST Request HTTP Response Splitting

low Nessus Network Monitor Plugin ID 2289

Synopsis

The remote host is vulnerable to an HTTP 'response splitting' vulnerability.

Description

The remote host seems to be running SnipSnap, a weblog application implemented in Java. It is reported that versions of SnipSnap prior 1.0.0b1 are prone to a HTTP response splitting vulnerability. An attacker may influence how the website is served, cached and interpreted by the means of a malformed link to the web site that would alter the server HTTP headers.

Solution

Upgrade to SnipSnap 1.0b1 or higher.

Plugin Details

Severity: Low

ID: 2289

Family: CGI

Published: 9/15/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:snipsnap:snipsnap

Reference Information

CVE: CVE-2004-1470

BID: 11180