Korean
<< Back
VID 22730
Severity 30
Port 8880, ...
Protocol TCP
Class WWW
Detailed Description IBM WebSphere Application Server 7.0 prior to Fix Pack 43 is running on the remote host. It is, therefore, affected by an HTTP response splitting vulnerability due to a failure to properly sanitize CRLF character sequences before user-supplied input is included in HTTP responses. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted URL link, to inject arbitrary HTTP headers.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www-01.ibm.com/support/docview.wss?uid=swg21982526

* Platforms Affected:
IBM WebSphere Application Server versions 7.0 prior to 7.0 Fix Pack 43
Recommendation Upgrade to the latest version of IBM WebSphere Application Server 7.0.0.43 or later, available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?uid=swg21982526
Related URL CVE-2016-0359 (CVE)
Related URL 91484 (SecurityFocus)
Related URL (ISS)