CRLF injection vulnerability in the Undertow web server in WildFly 10.0.0, as used in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-1841.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/92894 | vdb entry |
https://access.redhat.com/errata/RHSA-2017:3458 | vendor advisory |
http://www.securitytracker.com/id/1036758 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2016-1838.html | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2017:3455 | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:3456 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1344321 | issue tracking third party advisory |
https://access.redhat.com/errata/RHSA-2017:3454 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-1839.html | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-1840.html | third party advisory vendor advisory |