{"id":"CVE-2015-3200","details":"mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.","modified":"2026-02-04T22:55:53.691567Z","published":"2015-06-09T14:59:01Z","related":["MGASA-2015-0338","SUSE-SU-2017:0728-1","SUSE-SU-2017:0731-1"],"references":[{"type":"ADVISORY","url":"http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html"},{"type":"ADVISORY","url":"http://redmine.lighttpd.net/issues/2646"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1032405"},{"type":"ADVISORY","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05247375"},{"type":"EVIDENCE","url":"http://jaanuskp.blogspot.com/2015/05/cve-2015-3200.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163223.html"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163286.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/74813"},{"type":"WEB","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10310"}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}