Unknown
CVE-2010-2761
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- cgi-simple,
- cgi-simple 0.078,
- cgi-simple 0.079,
- cgi-simple 0.080,
- cgi-simple 0.081,
- cgi-simple 0.082,
- cgi-simple 0.83,
- cgi-simple 1.0,
- cgi-simple 1.1,
- cgi-simple 1.1.1,
- cgi-simple 1.1.2,
- cgi-simple 1.103,
- cgi-simple 1.104,
- cgi-simple 1.105,
- cgi-simple 1.106,
- cgi-simple 1.107,
- cgi-simple 1.108,
- cgi-simple 1.109,
- cgi-simple 1.110,
- cgi-simple 1.111,
- cgi.pm,
- cgi.pm 1.4,
- cgi.pm 1.42,
- cgi.pm 1.43,
- cgi.pm 1.44,
- cgi.pm 1.45,
- cgi.pm 1.50,
- cgi.pm 1.51,
- cgi.pm 1.52,
- cgi.pm 1.53,
- cgi.pm 1.54,
- cgi.pm 1.55,
- cgi.pm 1.56,
- cgi.pm 1.57,
- cgi.pm 2.0,
- cgi.pm 2.01,
- cgi.pm 2.13,
- cgi.pm 2.14,
- cgi.pm 2.15,
- cgi.pm 2.16,
- cgi.pm 2.17,
- cgi.pm 2.18,
- cgi.pm 2.19,
- cgi.pm 2.20,
- cgi.pm 2.21,
- cgi.pm 2.22,
- cgi.pm 2.23,
- cgi.pm 2.24,
- cgi.pm 2.25,
- cgi.pm 2.26,
- cgi.pm 2.27,
- cgi.pm 2.28,
- cgi.pm 2.29,
- cgi.pm 2.30,
- cgi.pm 2.31,
- cgi.pm 2.32,
- cgi.pm 2.33,
- cgi.pm 2.34,
- cgi.pm 2.35,
- cgi.pm 2.36,
- cgi.pm 2.37,
- cgi.pm 2.38,
- cgi.pm 2.39,
- cgi.pm 2.40,
- cgi.pm 2.41,
- cgi.pm 2.42,
- cgi.pm 2.43,
- cgi.pm 2.44,
- cgi.pm 2.45,
- cgi.pm 2.46,
- cgi.pm 2.47,
- cgi.pm 2.48,
- cgi.pm 2.49,
- cgi.pm 2.50,
- cgi.pm 2.51,
- cgi.pm 2.52,
- cgi.pm 2.53,
- cgi.pm 2.54,
- cgi.pm 2.55,
- cgi.pm 2.56,
- cgi.pm 2.57,
- cgi.pm 2.58,
- cgi.pm 2.59,
- cgi.pm 2.60,
- cgi.pm 2.61,
- cgi.pm 2.62,
- cgi.pm 2.63,
- cgi.pm 2.64,
- cgi.pm 2.65,
- cgi.pm 2.66,
- cgi.pm 2.67,
- cgi.pm 2.68,
- cgi.pm 2.69,
- cgi.pm 2.70,
- cgi.pm 2.71,
- cgi.pm 2.72,
- cgi.pm 2.73,
- cgi.pm 2.74,
- cgi.pm 2.75,
- cgi.pm 2.751,
- cgi.pm 2.752,
- cgi.pm 2.76,
- cgi.pm 2.77,
- cgi.pm 2.78,
- cgi.pm 2.79,
- cgi.pm 2.80,
- cgi.pm 2.81,
- cgi.pm 2.82,
- cgi.pm 2.83,
- cgi.pm 2.84,
- cgi.pm 2.85,
- cgi.pm 2.86,
- cgi.pm 2.87,
- cgi.pm 2.88,
- cgi.pm 2.89,
- cgi.pm 2.90,
- cgi.pm 2.91,
- cgi.pm 2.92,
- cgi.pm 2.93,
- cgi.pm 2.94,
- cgi.pm 2.95,
- cgi.pm 2.96,
- cgi.pm 2.97,
- cgi.pm 2.98,
- cgi.pm 2.99,
- cgi.pm 3.00,
- cgi.pm 3.01,
- cgi.pm 3.02,
- cgi.pm 3.03,
- cgi.pm 3.04,
- cgi.pm 3.05,
- cgi.pm 3.06,
- cgi.pm 3.07,
- cgi.pm 3.08,
- cgi.pm 3.09,
- cgi.pm 3.10,
- cgi.pm 3.11,
- cgi.pm 3.12,
- cgi.pm 3.13,
- cgi.pm 3.14,
- cgi.pm 3.15,
- cgi.pm 3.16,
- cgi.pm 3.17,
- cgi.pm 3.18,
- cgi.pm 3.19,
- cgi.pm 3.20,
- cgi.pm 3.21,
- cgi.pm 3.22,
- cgi.pm 3.23,
- cgi.pm 3.24,
- cgi.pm 3.25,
- cgi.pm 3.26,
- cgi.pm 3.27,
- cgi.pm 3.28,
- cgi.pm 3.29,
- cgi.pm 3.30,
- cgi.pm 3.31,
- cgi.pm 3.32,
- cgi.pm 3.33,
- cgi.pm 3.34,
- cgi.pm 3.35,
- cgi.pm 3.36,
- cgi.pm 3.37,
- cgi.pm 3.38,
- cgi.pm 3.39,
- cgi.pm 3.40,
- cgi.pm 3.41,
- cgi.pm 3.42,
- cgi.pm 3.43,
- cgi.pm 3.44,
- cgi.pm 3.45,
- cgi.pm 3.46,
- cgi.pm 3.47,
- cgi.pm 3.48
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: