Korean
<< Back
VID 22732
Severity 30
Port 8880, ...
Protocol TCP
Class WWW
Detailed Description IBM WebSphere Application Server 16.0 prior to Fix Pack 2 is running on the remote host. It is, therefore, affected by an HTTP response splitting vulnerability due to a failure to properly sanitize CRLF character sequences before user-supplied input is included in HTTP responses. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted URL link, to inject arbitrary HTTP headers.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www-01.ibm.com/support/docview.wss?uid=swg21982526

* Platforms Affected:
IBM WebSphere Application Server versions 16.0 prior to 16.0 Fix Pack 2
Recommendation Upgrade to the latest version of IBM WebSphere Application Server 16.0.0.2 or later, available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?uid=swg21982526
Related URL CVE-2016-0359 (CVE)
Related URL 91484 (SecurityFocus)
Related URL (ISS)