First published: Wed Apr 06 2016(Updated: )
CRLF injection vulnerability in CA API Gateway (formerly Layer7 API Gateway) 7.1 before 7.1.04, 8.0 through 8.3 before 8.3.01, and 8.4 before 8.4.01 allows remote attackers to have an unspecified impact via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Broadcom API Gateway | =7.1 | |
Broadcom API Gateway | =8.0 | |
Broadcom API Gateway | =8.1 | |
Broadcom API Gateway | =8.2 | |
Broadcom API Gateway | =8.3 | |
Broadcom API Gateway | =8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3118 has been classified as a CRLF injection vulnerability, which can lead to unspecified impacts when exploited.
To mitigate CVE-2016-3118, update to versions 7.1.04, 8.3.01, or 8.4.01 of the CA API Gateway.
CVE-2016-3118 affects CA API Gateway versions 7.1 before 7.1.04, 8.0 through 8.3 before 8.3.01, and 8.4 before 8.4.01.
Yes, CVE-2016-3118 allows remote attackers to exploit the vulnerability via unknown vectors.
CRLF injection refers to the ability to inject carriage return and line feed characters into an HTTP response, potentially leading to security issues.