Multiple HTTP Response Splitting vulnerabilities in osCommerce 2.2 Milestone 2 and earlier allow remote attackers to spoof web content and poison web caches via hex-encoded CRLF ("%0d%0a") sequences in the (1) products_id or (2) pid parameter to index.php or (3) goto parameter to banner.php.
Software | From | Fixed in |
---|---|---|
oscommerce / oscommerce | 2.1 | 2.1.x |
oscommerce / oscommerce | 2.2_cvs | 2.2_cvs.x |
oscommerce / oscommerce | 2.2_ms1 | 2.2_ms1.x |
oscommerce / oscommerce | 2.2_ms2 | 2.2_ms2.x |