View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0000117 | AlmaLinux-8 | lynx | public | 2021-08-12 16:49 | 2021-12-13 14:14 |
Reporter | moredaylight | Assigned To | |||
Priority | normal | Severity | minor | Reproducibility | have not tried |
Status | new | Resolution | open | ||
Summary | 0000117: CVE-2021-38165: Lynx through 2.8.9 can expose credentials via SNI | ||||
Description | https://nvd.nist.gov/vuln/detail/CVE-2021-38165 Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data. https://www.openwall.com/lists/oss-security/2021/08/07/1 | ||||
Steps To Reproduce | If you have an HTTPS server listening on localhost, this is pretty easy to reproduce. Use tcpdump or wireshark to watch traffic. tcpdump -vvA -i lo port 443 Attempt to connect to localhost passing credentials in the URL. lynx https://user:password@localhost/ You will see "user:password@localhost" in the plaintext of the tcpdump output. | ||||
Tags | No tags attached. | ||||
abrt_hash | |||||
URL | |||||
|
this is something to be reported and fixed upstream |
|
RHEL8 is not listed for some reason. https://access.redhat.com/security/cve/cve-2021-38165 |
Date Modified | Username | Field | Change |
---|---|---|---|
2021-08-12 16:49 | moredaylight | New Issue | |
2021-12-13 03:59 | akdev | Note Added: 0000445 | |
2021-12-13 14:14 | alukoshko | Note Added: 0000451 |