IBM WebSphere Application Server 7.0 < 7.0.0.43 / 8.0 < 8.0.0.13 / 8.5 < 8.5.5.10 / Liberty 16.0 < 16.0.0.2 CRLF Sequences HTTP Response Splitting

medium Nessus Plugin ID 92724

Synopsis

A web application server running on the remote host is affected by an HTTP response splitting vulnerability.

Description

The IBM WebSphere Application Server running on the remote host is version 7.0 prior to 7.0.0.43, 8.0 prior to 8.0.0.13, 8.5 prior to 8.5.5.10, or 16.0 (Liberty) prior to 16.0.0.2. It is, therefore, affected by an HTTP response splitting vulnerability due to a failure to properly sanitize CRLF character sequences before user-supplied input is included in HTTP responses. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted URL link, to inject arbitrary HTTP headers.

Solution

Apply IBM WebSphere Application Server version 7.0 Fix Pack 43 (7.0.0.43) / 8.0 Fix Pack 13 (8.0.0.13) / 8.5 Fix Pack 10 (8.5.5.10) Liberty 16.0 Fix Pack 2 (16.0.0.2) or later. Alternatively, apply the appropriate interim fixes as recommended in the vendor advisory.

See Also

http://www-01.ibm.com/support/docview.wss?uid=swg21982526

Plugin Details

Severity: Medium

ID: 92724

File Name: websphere_16_0_0_2.nasl

Version: 1.10

Type: remote

Family: Web Servers

Published: 8/4/2016

Updated: 8/7/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 6/23/2016

Vulnerability Publication Date: 6/23/2016

Reference Information

CVE: CVE-2016-0359

BID: 91484