Description
WordPress is prone to a HTTP response splitting vulnerability. The issue presents itself due to a flaw in the affected script that allows an attacker to manipulate how GET requests are handled. A remote attacker may exploit this vulnerability to influence or misrepresent how web content is served, cached or interpreted. This could aid in various attacks, which try to entice client users into a false sense of trust. WordPress version 1.2 is vulnerable.
Remediation
Update to WordPress version 1.2.1 or latest
References
http://www.securityfocus.com/bid/11348/exploit
http://www.securityfocus.com/archive/1/377770
http://packetstormsecurity.org/files/view/34611/wordpress12split.txt
Related Vulnerabilities
Roundcube Cross-site Scripting (XSS) Vulnerability (CVE-2015-8864)
WordPress Plugin Stylish Cost Calculator Cross-Site Scripting (7.0.3)
WordPress Plugin Video Conferencing with Zoom Information Disclosure (3.8.16)
Joomla! Core 1.0.x Multiple Unspecified Vulnerabilities (1.0.0 - 1.0.9)
Django Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2022-23833)