Vulnerability Description
CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki 2006-03-09e, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the media parameter. NOTE: this issue can be leveraged for XSS attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Andreas Gohr | Dokuwiki | release_2006-03-09 |
References
- http://osvdb.org/31620
- http://secunia.com/advisories/23926Vendor Advisory
- http://secunia.com/advisories/24853Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200704-08.xml
- http://sla.ckers.org/forum/read.php?3%2C880%2C1361#msg-1361
- http://www.securityfocus.com/bid/22236
- http://www.vupen.com/english/advisories/2007/0357
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31930
- http://osvdb.org/31620
- http://secunia.com/advisories/23926Vendor Advisory
- http://secunia.com/advisories/24853Vendor Advisory
- http://security.gentoo.org/glsa/glsa-200704-08.xml
- http://sla.ckers.org/forum/read.php?3%2C880%2C1361#msg-1361
- http://www.securityfocus.com/bid/22236
- http://www.vupen.com/english/advisories/2007/0357
FAQ
What is CVE-2006-6965?
CVE-2006-6965 is a vulnerability with a CVSS score of 4.3 (MEDIUM). CRLF injection vulnerability in lib/exe/fetch.php in DokuWiki 2006-03-09e, and possibly earlier, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks vi...
How severe is CVE-2006-6965?
CVE-2006-6965 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6965?
Check the references section above for vendor advisories and patch information. Affected products include: Andreas Gohr Dokuwiki.