First published: Tue Aug 07 2007(Updated: )
CRLF injection vulnerability in the redirect feature in Sun Java System Web Server 6.1 and 7.0 before 20070802, when the redirect Server Application Function (SAF) uses the url-prefix parameter and escape is disabled, or an Error directive uses the url-prefix parameter in obj.conf, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun Java System Web Server | =6.1-sp1 | |
Sun Java System Web Server | =6.1-sp6 | |
Sun Java System Web Server | =6.1-sp3 | |
Sun Java System Web Server | =6.1 | |
Sun Java System Web Server | =6.1-sp4 | |
Sun Java System Web Server | =6.1-sp5 | |
Sun Java System Web Server | =7.0 | |
Sun Java System Web Server | =6.1-sp2 | |
Sun Java System Web Server | =6.1-sp7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.