First published: Thu Sep 05 2013(Updated: )
Multiple CRLF injection vulnerabilities in Open-Xchange Server before 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14 allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted parameter, as demonstrated by (1) the location parameter to ajax/redirect or (2) multiple infostore URIs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux Openexchange Server | =6.20.7 | |
SUSE Linux Openexchange Server | =6.22.0 | |
SUSE Linux Openexchange Server | =6.22.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1647 has been rated as Medium severity due to the potential for unauthorized HTTP header injection and HTTP response splitting attacks.
CVE-2013-1647 affects Open-Xchange Server versions prior to 6.20.7 rev14, 6.22.0 before rev13, and 6.22.1 before rev14.
To fix CVE-2013-1647, you should upgrade Open-Xchange Server to the latest version that includes the security patches addressing the vulnerability.
CVE-2013-1647 allows remote attackers to conduct HTTP response splitting attacks by injecting arbitrary HTTP headers.
There are no specific workarounds for CVE-2013-1647, so applying the appropriate security updates is strongly recommended.