Bug 82906 - CRLF injection
CRLF injection
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: lynx (Show other bugs)
2.1
All Linux
medium Severity medium
: ---
: ---
Assigned To: Tim Waugh
Brian Brock
http://www.mail-archive.com/bugtraq@s...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2003-01-28 06:34 EST by Tim Waugh
Modified: 2007-11-30 17:06 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2003-02-21 03:43:24 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Better test case (305 bytes, text/plain)
2003-02-12 12:00 EST, Tim Waugh
no flags Details

  None (edit)
Description Tim Waugh 2003-01-28 06:34:58 EST
Description of problem:
lynx is vulnerable to CRLF injection:
http://www.mail-archive.com/bugtraq@securityfocus.com/msg08897.html

Version-Release number of selected component (if applicable):
2.8.4-17

How reproducible:
100%

Steps to Reproduce:
1. lynx "http://www.redhat.com HTTP/1.0
Host: www.microsoft.com

"
    
Actual results:
Microsoft's front page.

Expected results:
Invalid URL.

Additional info:
Comment 1 Tim Waugh 2003-02-12 12:00:49 EST
Created attachment 90035 [details]
Better test case

Use this test procedure instead.

1. ./test-lynx.sh
2. Examine output.  Fail if any of the numbered output lines are 'Host:
www.redhat.com' (the script will say 'FAIL' too).
Comment 3 Mark J. Cox (Product Security) 2003-02-21 03:43:24 EST
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2003-030.html

Note You need to log in before you can comment on or make changes to this bug.