SnipSnap < 1.0b1 POST Request HTTP Response Splitting

Low Nessus Network Monitor Plugin ID 2289


The remote host is vulnerable to an HTTP 'response splitting' vulnerability.


The remote host seems to be running SnipSnap, a weblog application implemented in Java. It is reported that versions of SnipSnap prior 1.0.0b1 are prone to a HTTP response splitting vulnerability. An attacker may influence how the website is served, cached and interpreted by the means of a malformed link to the web site that would alter the server HTTP headers.


Upgrade to SnipSnap 1.0b1 or higher.

Plugin Details

Severity: Low

ID: 2289

Family: CGI

Published: 2004/09/15

Modified: 2018/09/16

Dependencies: 1442

Risk Information

Risk Factor: Low


Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C


Base Score: 3.6

Temporal Score: 3.4


Temporal Vector: CVSS3#E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:snipsnap:snipsnap

Reference Information

CVE: CVE-2004-1470

BID: 11180