vendor:
Lynx
by:
Ulf Harnhammar
7.5
CVSS
HIGH
CRLF Injection
94
CWE
Product Name: Lynx
Affected Version From: 2.8.4rel.1
Affected Version To: 2.8.5dev.8
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002
CRLF Injection Vulnerability in Lynx
A CRLF injection vulnerability has been reported for Lynx that may allow an attacker to include extra HTTP headers when viewing web pages. If Lynx is called from the command line, carriage return and line feed (CRLF) characters may be included in the specified URL. These characters are not escaped when the input is used to construct a HTTP request. Exploitation of this flaw may allow an attacker to inject additional HTTP headers into a request. Abuse of the 'Host' header may cause the request to be served as if made to a different domain, possibly providing the attacker with more control over the content returned.
Mitigation:
Ensure that all user-supplied input is properly sanitized and validated before being used in a HTTP request.