Short Name |
HTTP:PHP:PHORUM:RESPONSE-SPLIT |
---|---|
Severity |
Warning |
Recommended |
No |
Category |
HTTP |
Keywords |
Phorum HTTP Response Splitting |
Release Date |
2005/08/12 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Phorum. Versions 5.0.14 and earlier are vulnerable. Attackers can send a maliciously crafted URL designed to exploit an input validation. A successful attack can allow the client to alter the way data is represented from the server.
A remote HTTP response splitting vulnerability reportedly affects Phorum. This issue is due to a failure of the application to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted. This issue was reported to affect Phorum version 5.0.14a; other versions might also be affected.