First published: Tue Mar 19 2013(Updated: )
CRLF injection vulnerability in spacewalk-java before 2.1.148-1 and Red Hat Network (RHN) Satellite 5.6 allows remote attackers to inject arbitrary HTTP headers, and conduct HTTP response splitting attacks and cross-site scripting (XSS) attacks, via the return_url parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/spacewalk-java-2.0.2 | <58 | 58 |
Red Hat Satellite | =5.6 | |
Red Hat Spacewalk | <=2.1.147-1 | |
=5.6 | ||
<=2.1.147-1 |
https://git.fedorahosted.org/cgit/spacewalk.git/commit/?id=18c70164285cae0660fa3ac55c6656bb19b3b13f
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1869 is classified as a critical severity vulnerability due to its potential for arbitrary HTTP header injection and other exploitations.
To fix CVE-2013-1869, update the affected software to spacewalk-java version 2.1.148-1 or later, or upgrade RHN Satellite to version 5.6.1 or later.
CVE-2013-1869 affects spacewalk-java versions up to 2.1.147-1 and RHN Satellite version 5.6.
Yes, CVE-2013-1869 can lead to cross-site scripting (XSS) attacks due to HTTP response splitting.
The CVE-2013-1869 vulnerability was reported by Ryan Giobbi from UPMC.