header-logo
Suggest Exploit
vendor:
NX5Linkx
by:
SecurityFocus
7.5
CVSS
HIGH
HTTP Response-Splitting
113
CWE
Product Name: NX5Linkx
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

NX5Linkx HTTP Response-Splitting Vulnerability

NX5Linkx is prone to an HTTP response-splitting vulnerability because the application fails to properly sanitize user-supplied input. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

Mitigation:

Input validation should be used to ensure that user-supplied data does not contain malicious content.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/20011/info

NX5Linkx is prone to an HTTP response-splitting vulnerability because the application fails to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

http://www.example.com% 0D%0A%0D%0AHTTP/1.0 200 OK%0D%0A%0D% 0A.......