Description
Multiple HTTP Response Splitting vulnerabilities in osCommerce 2.2 Milestone 2 and earlier allow remote attackers to spoof web content and poison web caches via hex-encoded CRLF ("%0d%0a") sequences in the (1) products_id or (2) pid parameter to index.php or (3) goto parameter to banner.php.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by GulfTech Security · textwebappsphp
https://www.exploit-db.com/exploits/25840
References (5)
Core 5
Core References
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111842744205117&w=2
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/15670
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=111936255011735&w=2
Various Sources x_refsource_misc
http://www.gulftech.org/?node=research&article_id=00080-06102005
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/13979
Scores
EPSS
0.0425
EPSS Percentile
88.8%
Details
Status
published
Products (4)
oscommerce/oscommerce
2.1
oscommerce/oscommerce
2.2_cvs
oscommerce/oscommerce
2.2_ms1
oscommerce/oscommerce
2.2_ms2
Published
Jun 16, 2005
Tracked Since
Feb 18, 2026