vendor:
Kallithea
by:
Gjoko 'LiquidWorm' Krstic
7,5
CVSS
HIGH
HTTP Response Splitting
20
CWE
Product Name: Kallithea
Affected Version From: 0.2.2
Affected Version To: 0.2.9
Patch Exists: Yes
Related CWE: CVE-2015-5285
CPE: a:kallithea:kallithea:0.2.9
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali, Python
2015
Kallithea 0.2.9 (came_from) HTTP Response Splitting Vulnerability
Kallithea suffers from a HTTP header injection (response splitting) vulnerability because it fails to properly sanitize user input before using it as an HTTP header value via the GET 'came_from' parameter in the login instance. This type of attack not only allows a malicious user to control the remaining headers and body of the response the application intends to send, but also allow them to create additional responses entirely under their control.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of Kallithea.