Vulnerabilities > CVE-2005-4831 - Unspecified vulnerability in Viewcvs 0.9.2
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN viewcvs
nessus
Summary
viewcvs in ViewCVS 0.9.2 allows remote attackers to set the Content-Type header to arbitrary values via the content-type parameter, which can be leveraged for cross-site scripting (XSS) and other attacks, as demonstrated using (1) "text/html", or (2) "image/jpeg" with an image that is rendered as HTML by Internet Explorer, a different vulnerability than CVE-2004-1062. NOTE: it was later reported that 0.9.4 is also affected.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | VIEWCVS_HTTP_RESPONSE_SPLITTING.NASL |
description | The remote host is running ViewCVS, a tool to browse CVS repositories over the web written in python. Flaws in the remote version of this website may allow an attacker to launch cross-site scripting and/or HTTP response-splitting attacks against the remote install. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16062 |
published | 2004-12-28 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16062 |
title | ViewCVS < 1.0.0 Multiple Vulnerabilities |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030514.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030514.html
- http://www.securityfocus.com/archive/1/461382/100/0/threaded
- http://www.securityfocus.com/archive/1/461382/100/0/threaded
- http://www.securityfocus.com/bid/12112
- http://www.securityfocus.com/bid/12112
- http://www.securitytracker.com/id?1017704
- http://www.securitytracker.com/id?1017704