WebCollab 'item' Parameter HTTP Response Splitting Vulnerability

WebCollab is prone to an HTTP-response-splitting vulnerability because it fails to properly sanitize user-supplied input.

Attackers can leverage this issue to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.


Privacy Statement
Copyright 2010, SecurityFocus