CRLF injection vulnerability in VMware vCenter Server 6.0 before U2 and ESXi 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1036543 | vdb entry |
http://www.securityfocus.com/bid/92324 | vdb entry |
http://www.securitytracker.com/id/1036544 | vdb entry |
http://www.securityfocus.com/archive/1/539128/100/0/threaded | mailing list |
http://www.vmware.com/security/advisories/VMSA-2016-0010.html | patch vendor advisory mitigation |
http://seclists.org/fulldisclosure/2016/Aug/38 | mailing list |
http://www.securitytracker.com/id/1036545 | vdb entry |
http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html |