-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Florian Weimer wrote:
> The whitepaper you referenced describes a vulnerability in web
> proxies.  The sqwebmail vulnerability could be used to exploit it, but
> then you could also direct the victim to a completely rogue web server
> under your control.

The whitepapers' scope is not limited to web proxies. Please take a
closer look at the paragraph entitled
> Introduction to HTTP Response Splitting
which starts on page 6 of the paper.

The redirection script given in this example is vulnerable in the same
way as sqwebmail. It allows for injection of carriage returns and
newlines in the same way which results in the ability to partially
modify the HTTP response header and body.

Regards,
Moritz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEb08Xn6GkvSd/BgwRAmRmAJ0f/fi4Nq2B9tH/XrKoRpkj+uctyACeKqMP
he18Isq7H/uopB85N/nisEM=
=pnmW
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to