← Volver a CVEs
CVE-2007-5034
N/ADescripcion
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado9/21/2007
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
elinks:elinks
Debilidades (CWE)
CWE-200
Referencias
http://bugzilla.elinks.cz/show_bug.cgi?id=937(security@ubuntu.com)
http://secunia.com/advisories/26936(security@ubuntu.com)
http://secunia.com/advisories/26949(security@ubuntu.com)
http://secunia.com/advisories/26956(security@ubuntu.com)
http://secunia.com/advisories/27038(security@ubuntu.com)
http://secunia.com/advisories/27062(security@ubuntu.com)
http://secunia.com/advisories/27125(security@ubuntu.com)
http://secunia.com/advisories/27132(security@ubuntu.com)
http://www.debian.org/security/2007/dsa-1380(security@ubuntu.com)
http://www.redhat.com/support/errata/RHSA-2007-0933.html(security@ubuntu.com)
http://www.securityfocus.com/archive/1/481606/100/0/threaded(security@ubuntu.com)
http://www.securityfocus.com/bid/25799(security@ubuntu.com)
http://www.securitytracker.com/id?1018764(security@ubuntu.com)
http://www.ubuntu.com/usn/usn-519-1(security@ubuntu.com)
http://www.vupen.com/english/advisories/2007/3278(security@ubuntu.com)
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018(security@ubuntu.com)
https://bugzilla.redhat.com/show_bug.cgi?id=297981(security@ubuntu.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10335(security@ubuntu.com)
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00079.html(security@ubuntu.com)
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00335.html(security@ubuntu.com)
http://bugzilla.elinks.cz/show_bug.cgi?id=937(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26936(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26949(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26956(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27038(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27062(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27125(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27132(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1380(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0933.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/481606/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/25799(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1018764(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-519-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3278(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=297981(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10335(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00079.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00335.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.