First published: Thu Jun 09 2016(Updated: )
CRLF injection vulnerability in the Undertow web server in WildFly 10.0.0, as used in Red Hat JBoss Enterprise Application Platform (EAP) 7.x before 7.0.2, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
JBoss Enterprise Application Platform | <=7.0.1 | |
Red Hat JBoss WildFly Application Server | =10.0.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4993 has a medium severity rating as it allows for HTTP response splitting attacks.
To fix CVE-2016-4993, upgrade to WildFly 10.0.1 or higher or JBoss EAP 7.0.2 or higher.
CVE-2016-4993 affects WildFly 10.0.0 and JBoss EAP 7.x versions prior to 7.0.2.
CVE-2016-4993 can allow attackers to conduct arbitrary HTTP header injection and HTTP response splitting attacks.
Organizations using WildFly 10.0.0 or JBoss EAP 7.x versions up to 7.0.1 are vulnerable to CVE-2016-4993.