CRLF injection vulnerability in Infoblox Network Automation NetMRI before 7.1.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the contentType parameter in a login action to config/userAdmin/login.tdf.
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html | vdb entry third party advisory |
http://www.securitytracker.com/id/1036736 | vdb entry third party advisory |
http://www.securityfocus.com/archive/1/539366/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/92794 | vdb entry third party advisory |