ID CVE-2008-4325
Summary lib/viewvc.py in ViewVC 1.0.5 uses the content-type parameter in the HTTP request for the Content-Type header in the HTTP response, which allows remote attackers to cause content to be misinterpreted by the browser via a content-type parameter that is inconsistent with the requested object. NOTE: this issue might not be a vulnerability, since it requires attacker access to the repository that is being viewed.
References
Vulnerable Configurations
  • cpe:2.3:a:viewvc:viewvc:1.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:viewvc:viewvc:1.0.5:*:*:*:*:*:*:*
CVSS
Base: 5.8 (as of 30-08-2010 - 04:00)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:P
refmap via4
confirm
fedora
  • FEDORA-2008-8252
  • FEDORA-2008-8270
mlist
  • [oss-security] 20080919 viewvc security flaw?
  • [oss-security] 20080920 Re: viewvc security flaw?
Last major update 30-08-2010 - 04:00
Published 30-09-2008 - 16:13
Last modified 30-08-2010 - 04:00
Back to Top