ELinks HTTPS POST Request Information Disclosure Weakness
BID:25799
Info
ELinks HTTPS POST Request Information Disclosure Weakness
| Bugtraq ID: | 25799 |
| Class: | Design Error |
| CVE: |
CVE-2007-5034 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 15 2007 12:00AM |
| Updated: | Mar 13 2008 03:51AM |
| Credit: | Kalle Olavi Niemitalo discovered this issue. |
| Vulnerable: |
Ubuntu Ubuntu Linux 7.04 sparc Ubuntu Ubuntu Linux 7.04 powerpc Ubuntu Ubuntu Linux 7.04 i386 Ubuntu Ubuntu Linux 7.04 amd64 Ubuntu Ubuntu Linux 6.10 sparc Ubuntu Ubuntu Linux 6.10 powerpc Ubuntu Ubuntu Linux 6.10 i386 Ubuntu Ubuntu Linux 6.10 amd64 Ubuntu Ubuntu Linux 6.06 LTS sparc Ubuntu Ubuntu Linux 6.06 LTS powerpc Ubuntu Ubuntu Linux 6.06 LTS i386 Ubuntu Ubuntu Linux 6.06 LTS amd64 rPath rPath Linux 1 Redhat Fedora Core6 Redhat Enterprise Linux WS 4 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux Desktop 5 client Redhat Enterprise Linux AS 4 Redhat Enterprise Linux 5 Server Redhat Desktop 4.0 ELinks ELinks 0.11.2 ELinks ELinks 0.11.1 ELinks ELinks 0.10.6 ELinks ELinks 0.10.4 ELinks ELinks 0.9.2 Debian Linux 4.0 sparc Debian Linux 4.0 s/390 Debian Linux 4.0 powerpc Debian Linux 4.0 mipsel Debian Linux 4.0 mips Debian Linux 4.0 ia-64 Debian Linux 4.0 ia-32 Debian Linux 4.0 hppa Debian Linux 4.0 arm Debian Linux 4.0 amd64 Debian Linux 4.0 alpha Debian Linux 4.0 |
| Not Vulnerable: |
ELinks ELinks 0.11.3 |
Discussion
ELinks HTTPS POST Request Information Disclosure Weakness
ELinks is prone to an information disclosure weakness.
In certain circumstances, the application may not encrypt HTTP POST data sent to servers using SSL.
This issue creates a false sense of security for a user because they may assume that sensitive data is being encrypted before it is sent to the remote server.
Versions prior to ELinks 0.11.3 are vulnerable to this issue.
ELinks is prone to an information disclosure weakness.
In certain circumstances, the application may not encrypt HTTP POST data sent to servers using SSL.
This issue creates a false sense of security for a user because they may assume that sensitive data is being encrypted before it is sent to the remote server.
Versions prior to ELinks 0.11.3 are vulnerable to this issue.
Exploit / POC
ELinks HTTPS POST Request Information Disclosure Weakness
An attacker can exploit this weakness by using a packet sniffer to capture traffic.
An attacker can exploit this weakness by using a packet sniffer to capture traffic.
Solution / Fix
ELinks HTTPS POST Request Information Disclosure Weakness
Solution:
The vendor has released ELinks 0.11.3 to address this issue. Please see the referenced advisories for more information.
ELinks ELinks 0.10.4
ELinks ELinks 0.10.6
ELinks ELinks 0.11.1
ELinks ELinks 0.11.2
Solution:
The vendor has released ELinks 0.11.3 to address this issue. Please see the referenced advisories for more information.
ELinks ELinks 0.10.4
-
ELinks elinks-0.11.3.tar.bz2
http://elinks.or.cz/download/elinks-0.11.3.tar.bz2
ELinks ELinks 0.10.6
-
ELinks elinks-0.11.3.tar.bz2
http://elinks.or.cz/download/elinks-0.11.3.tar.bz2
ELinks ELinks 0.11.1
-
ELinks elinks-0.11.3.tar.bz2
http://elinks.or.cz/download/elinks-0.11.3.tar.bz2
ELinks ELinks 0.11.2
-
ELinks elinks-0.11.3.tar.bz2
http://elinks.or.cz/download/elinks-0.11.3.tar.bz2
References
ELinks HTTPS POST Request Information Disclosure Weakness
References:
References:
- Bugzilla Bug 937 - ELinks reveals POST data to HTTPS proxy ([email protected] (Kalle Olavi Niemitalo))
- Elinks Home Page (Elinks)
- RHSA-2007:0933-2 elinks security update (Red Hat)