Vulnerability Description
CRLF injection vulnerability in the drupal_goto function in includes/common.inc Drupal 4.7.x before 4.7.8 and 5.x before 5.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Drupal | Drupal | >= 4.7.0, < 4.7.8 |
Related Weaknesses (CWE)
References
- http://drupal.org/node/184315Vendor Advisory
- http://secunia.com/advisories/27292Third Party Advisory
- http://secunia.com/advisories/27352Third Party Advisory
- http://www.securityfocus.com/bid/26119Third Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2007/3546Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37264Third Party AdvisoryVDB Entry
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.htThird Party Advisory
- http://drupal.org/node/184315Vendor Advisory
- http://secunia.com/advisories/27292Third Party Advisory
- http://secunia.com/advisories/27352Third Party Advisory
- http://www.securityfocus.com/bid/26119Third Party AdvisoryVDB Entry
- http://www.vupen.com/english/advisories/2007/3546Third Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/37264Third Party AdvisoryVDB Entry
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00328.htThird Party Advisory
FAQ
What is CVE-2007-5595?
CVE-2007-5595 is a vulnerability with a CVSS score of 5.1 (MEDIUM). CRLF injection vulnerability in the drupal_goto function in includes/common.inc Drupal 4.7.x before 4.7.8 and 5.x before 5.3 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP r...
How severe is CVE-2007-5595?
CVE-2007-5595 has been rated MEDIUM with a CVSS base score of 5.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5595?
Check the references section above for vendor advisories and patch information. Affected products include: Drupal Drupal.