ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1380-1 | New elinks packages fix information disclosure |
EUVD |
EUVD-2007-5015 | ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https. |
Ubuntu USN |
USN-519-1 | elinks vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-07T15:17:27.970Z
Reserved: 2007-09-21T00:00:00
Link: CVE-2007-5034
No data.
Status : Deferred
Published: 2007-09-21T20:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-5034
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN