VID |
22730 |
Severity |
30 |
Port |
8880, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
IBM WebSphere Application Server 7.0 prior to Fix Pack 43 is running on the remote host. It is, therefore, affected by an HTTP response splitting vulnerability due to a failure to properly sanitize CRLF character sequences before user-supplied input is included in HTTP responses. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted URL link, to inject arbitrary HTTP headers.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www-01.ibm.com/support/docview.wss?uid=swg21982526
* Platforms Affected: IBM WebSphere Application Server versions 7.0 prior to 7.0 Fix Pack 43 |
Recommendation |
Upgrade to the latest version of IBM WebSphere Application Server 7.0.0.43 or later, available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?uid=swg21982526 |
Related URL |
CVE-2016-0359 (CVE) |
Related URL |
91484 (SecurityFocus) |
Related URL |
(ISS) |
|