IBM WebSphere Application Server Edge Caching Proxy Lets Remote Users Conduct HTTP Response Splitting Attacks
|
SecurityTracker Alert ID: 1039521 |
SecurityTracker URL: http://securitytracker.com/id/1039521
|
CVE Reference:
CVE-2017-1503
(Links to External Site)
|
Date: Oct 10 2017
|
Impact:
Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 7.0, 8.0, 8.5, 9.0
|
Description:
A vulnerability was reported in IBM WebSphere Application Server Edge Caching Proxy. A remote user can conduct HTTP response splitting attacks.
A remote user can submit a specially crafted URL to cause the target Edge Caching Proxy component to return a split response. A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks.
|
Impact:
A remote user can create a URL that, when loaded by the target user, will cause arbitrary content to be displayed.
A remote user may be able to poison any intermediate web caches with arbitrary content.
|
Solution:
IBM has issued a fix (APAR PI82587).
The IBM advisory is available at:
http://www.ibm.com/support/docview.wss?uid=swg22006815
|
Vendor URL: www.ibm.com/support/docview.wss?uid=swg22006815 (Links to External Site)
|
Cause:
Input validation error
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any), z/OS
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|