First published: Mon Feb 15 2016(Updated: )
CRLF injection vulnerability in the drupal_set_header function in Drupal 6.x before 6.38, when used with PHP before 5.1.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by leveraging a module that allows user-submitted data to appear in HTTP headers.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/drupal/core | >=8.0<8.0.4 | |
composer/drupal/drupal | >=8.0<8.0.4 | |
composer/drupal/drupal | >=6.0<6.38 | 6.38 |
composer/drupal/core | >=6.0<6.38 | 6.38 |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Drupal | =6.0 | |
Drupal | =6.0-beta1 | |
Drupal | =6.0-beta2 | |
Drupal | =6.0-beta3 | |
Drupal | =6.0-beta4 | |
Drupal | =6.0-dev | |
Drupal | =6.0-rc1 | |
Drupal | =6.0-rc2 | |
Drupal | =6.0-rc3 | |
Drupal | =6.0-rc4 | |
Drupal | =6.1 | |
Drupal | =6.2 | |
Drupal | =6.3 | |
Drupal | =6.4 | |
Drupal | =6.5 | |
Drupal | =6.6 | |
Drupal | =6.7 | |
Drupal | =6.8 | |
Drupal | =6.9 | |
Drupal | =6.10 | |
Drupal | =6.11 | |
Drupal | =6.12 | |
Drupal | =6.13 | |
Drupal | =6.14 | |
Drupal | =6.15 | |
Drupal | =6.16 | |
Drupal | =6.17 | |
Drupal | =6.18 | |
Drupal | =6.19 | |
Drupal | =6.20 | |
Drupal | =6.21 | |
Drupal | =6.22 | |
Drupal | =6.23 | |
Drupal | =6.24 | |
Drupal | =6.25 | |
Drupal | =6.26 | |
Drupal | =6.27 | |
Drupal | =6.28 | |
Drupal | =6.29 | |
Drupal | =6.30 | |
Drupal | =6.31 | |
Drupal | =6.32 | |
Drupal | =6.33 | |
Drupal | =6.34 | |
Drupal | =6.35 | |
Drupal | =6.36 | |
Drupal | =6.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3166 is rated as a medium severity vulnerability.
To fix CVE-2016-3166, upgrade to Drupal version 6.38 or later.
Drupal versions 6.x before 6.38 are affected by CVE-2016-3166.
CVE-2016-3166 facilitates HTTP response splitting attacks through CRLF injection.
Yes, CVE-2016-3166 can be exploited remotely by attackers.