ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1380-1 | New elinks packages fix information disclosure |
![]() |
EUVD-2007-5015 | ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https. |
![]() |
USN-519-1 | elinks vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-07T15:17:27.970Z
Reserved: 2007-09-21T00:00:00
Link: CVE-2007-5034

No data.

Status : Deferred
Published: 2007-09-21T20:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-5034


No data.