CVE-2006-6965

Current Description

CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki 2006-03-09e, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the media parameter. NOTE: this issue can be leveraged for XSS attacks.

Basic Data

PublishedJanuary 29, 2007
Last ModifiedJuly 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationAndreas GohrDokuwikirelease_2006-03-09*******
    2.3ApplicationAndreas GohrDokuwikirelease_2006-03-09e*******

Vulnerable Software List

VendorProductVersions
Andreas Gohr Dokuwiki release_2006-03-09, release_2006-03-09e

References

NameSourceURLTags
31620http://osvdb.org/31620OSVDB
23926http://secunia.com/advisories/23926SECUNIAVendor Advisory
24853http://secunia.com/advisories/24853SECUNIAVendor Advisory
GLSA-200704-08http://security.gentoo.org/glsa/glsa-200704-08.xmlGENTOO
http://sla.ckers.org/forum/read.php?3,880,1361#msg-1361http://sla.ckers.org/forum/read.php?3,880,1361#msg-1361MISCVendor Advisory
22236http://www.securityfocus.com/bid/22236BID
ADV-2007-0357http://www.vupen.com/english/advisories/2007/0357VUPEN
dokuwiki-fetch-response-splitting(31930)https://exchange.xforce.ibmcloud.com/vulnerabilities/31930XF