CVE-2008-4325
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
lib/viewvc.py in ViewVC 1.0.5 uses the content-type parameter in the HTTP request for the Content-Type header in the HTTP response, which allows remote attackers to cause content to be misinterpreted by the browser via a content-type parameter that is inconsistent with the requested object. NOTE: this issue might not be a vulnerability, since it requires attacker access to the repository that is being viewed.
lib/viewvc.py en ViewVC v1.0.5 utiliza el parametro "content-type" en la peticion HTTP para la cabecera "content-type" en la respuesta HTTP, que permite a los atacantes remotos provocar una malinterpretacion del contenido por parte del navegador, a traves de el parametro "content-type" que no corresponde con el objeto solicitado. NOTA: Esta caracteristica puede no ser una vulnerabilidad, dado que requiere que el atacante acceda al repositorio que esta viendo.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-09-30 CVE Reserved
- 2008-09-30 CVE Published
- 2024-09-17 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://viewvc.tigris.org/source/browse/viewvc/trunk/lib/viewvc.py?rev=2011&r1=1968&r2=1978 | X_refsource_confirm | |
http://viewvc.tigris.org/source/browse/viewvc?rev=1978&view=rev | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2008/09/19/4 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2008/09/20/1 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://viewvc.tigris.org/issues/show_bug.cgi?id=354 | 2010-08-30 |