First published: Wed Dec 05 2012(Updated: )
CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Spring Security | =3.0.0 | |
VMware Spring Security | =3.0.2 | |
VMware Spring Security | =2.0.3 | |
VMware Spring Security | <=3.0.5 | |
VMware Spring Security | <=2.0.6 | |
VMware Spring Security | =2.0.5 | |
VMware Spring Security | =2.0.2 | |
VMware Spring Security | =2.0.0 | |
VMware Spring Security | =3.0.3 | |
VMware Spring Security | =2.0.1 | |
VMware Spring Security | =3.0.1 | |
VMware Spring Security | =2.0.4 | |
VMware Spring Security | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2011-2732.
CVE-2011-2732 is considered a high severity vulnerability due to its potential for HTTP response splitting attacks.
To fix CVE-2011-2732, upgrade VMware SpringSource Spring Security to version 2.0.7 or 3.0.6 or later.
Versions 2.0.0 to 2.0.6 and 3.0.0 to 3.0.5 of VMware SpringSource Spring Security are affected by CVE-2011-2732.
Yes, CVE-2011-2732 allows remote attackers to inject arbitrary HTTP headers, which could lead to various types of attacks.