SAP Web Application Server中frameset.htm的HTTP响应拆分漏洞

漏洞信息详情

SAP Web Application Server中frameset.htm的HTTP响应拆分漏洞

漏洞简介

SAP Web Application Server是一款WEB应用服务程序。

SAP Web Application Server (WAS) 6.10至7.00的frameset.htm中的HTTP响应拆分漏洞,可让远程攻击者通过sap-exiturl参数注入任意HTML头。

漏洞公告

参考网址

来源: XF

名称: sap-sapexiturl-response-splitting(23030)

链接:http://xforce.iss.net/xforce/xfdb/23030

来源: SECTRACK

名称: 1015174

链接:http://www.securitytracker.com/alerts/2005/Nov/1015174.html

来源: BID

名称: 15360

链接:http://www.securityfocus.com/bid/15360/

来源: SECUNIA

名称: 17515

链接:http://secunia.com/advisories/17515/

来源: BUGTRAQ

名称: 20051109 CYBSEC – Security Advisory: HTTP Response Splitting in SAP WAS

链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113156438708932&w=2

来源: BUGTRAQ

名称: 20051109 CYBSEC – Security Advisory: HTTP Response Splitting in SAP WAS

链接:http://marc.theaimsgroup.com/?l=bugtraq&m=113156438708932&w=2

来源: OSVDB

名称: 20714

链接:http://www.osvdb.org/20714

来源: VUPEN

名称: ADV-2005-2361

链接:http://www.frsirt.com/english/advisories/2005/2361

来源: MISC

链接:http://www.cybsec.com/vuln/CYBSEC_Security_Advisory_HTTP_Response_Splitting_in_SAP_WAS.pdf

来源: SREASON

名称: 164

链接:http://securityreason.com/securityalert/164

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享