Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2007-5034
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ELinks HTTPS POST请求信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ELinks是一款Linux系统下的开源纯文本浏览器。 ELinks实现现HTTPS POST请求的方式存在漏洞,可能导致敏感信息泄露。 如果ELinks向HTTPS URL发送POST请求,且为HTTPS定义了代理,ELinks就会将POST请求的消息体和Content-*头以明文添加到CONNECT请求中,因此代理就可以嗅探到本应受到TLS保护的所有数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2007-5034
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2007-5034
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2007-5034

No comments yet


Leave a comment