← Retour aux CVEs
CVE-2007-5034
N/ADescription
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Details CVE
Score CVSS v3.1N/A
Publie9/21/2007
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
elinks:elinks
Faiblesses (CWE)
CWE-200
References
http://bugzilla.elinks.cz/show_bug.cgi?id=937(security@ubuntu.com)
http://secunia.com/advisories/26936(security@ubuntu.com)
http://secunia.com/advisories/26949(security@ubuntu.com)
http://secunia.com/advisories/26956(security@ubuntu.com)
http://secunia.com/advisories/27038(security@ubuntu.com)
http://secunia.com/advisories/27062(security@ubuntu.com)
http://secunia.com/advisories/27125(security@ubuntu.com)
http://secunia.com/advisories/27132(security@ubuntu.com)
http://www.debian.org/security/2007/dsa-1380(security@ubuntu.com)
http://www.redhat.com/support/errata/RHSA-2007-0933.html(security@ubuntu.com)
http://www.securityfocus.com/archive/1/481606/100/0/threaded(security@ubuntu.com)
http://www.securityfocus.com/bid/25799(security@ubuntu.com)
http://www.securitytracker.com/id?1018764(security@ubuntu.com)
http://www.ubuntu.com/usn/usn-519-1(security@ubuntu.com)
http://www.vupen.com/english/advisories/2007/3278(security@ubuntu.com)
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018(security@ubuntu.com)
https://bugzilla.redhat.com/show_bug.cgi?id=297981(security@ubuntu.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10335(security@ubuntu.com)
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00079.html(security@ubuntu.com)
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00335.html(security@ubuntu.com)
http://bugzilla.elinks.cz/show_bug.cgi?id=937(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26936(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26949(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26956(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27038(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27062(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27125(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27132(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1380(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0933.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/481606/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/25799(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1018764(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-519-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3278(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.launchpad.net/ubuntu/+source/elinks/+bug/141018(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=297981(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10335(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00079.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00335.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.