First published: Wed Jun 15 2016(Updated: )
CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <6.7.0 | 6.7.0 |
redhat/nodejs | <4.6.0 | 4.6.0 |
redhat/nodejs | <0.12.16 | 0.12.16 |
redhat/nodejs | <0.10.47 | 0.10.47 |
Langgenius Dify Node.js | =4.0.0 | |
Langgenius Dify Node.js | =4.1.0 | |
Langgenius Dify Node.js | =4.1.1 | |
Langgenius Dify Node.js | =4.1.2 | |
Langgenius Dify Node.js | =4.2.0 | |
Langgenius Dify Node.js | =4.2.1 | |
Langgenius Dify Node.js | =4.2.2 | |
Langgenius Dify Node.js | =4.2.3 | |
Langgenius Dify Node.js | =4.2.4 | |
Langgenius Dify Node.js | =4.2.5 | |
Langgenius Dify Node.js | =4.2.6 | |
Langgenius Dify Node.js | =4.3.0 | |
Langgenius Dify Node.js | =4.3.1 | |
Langgenius Dify Node.js | =4.3.2 | |
Langgenius Dify Node.js | =4.4.0 | |
Langgenius Dify Node.js | =4.4.1 | |
Langgenius Dify Node.js | =4.4.2 | |
Langgenius Dify Node.js | =4.4.3 | |
Langgenius Dify Node.js | =4.4.4 | |
Langgenius Dify Node.js | =4.4.5 | |
Langgenius Dify Node.js | =4.4.6 | |
Langgenius Dify Node.js | =4.4.7 | |
Langgenius Dify Node.js | =4.5.0 | |
Langgenius Dify Node.js | =0.10.0 | |
Langgenius Dify Node.js | =0.10.1 | |
Langgenius Dify Node.js | =0.10.2 | |
Langgenius Dify Node.js | =0.10.3 | |
Langgenius Dify Node.js | =0.10.4 | |
Langgenius Dify Node.js | =0.10.5 | |
Langgenius Dify Node.js | =0.10.6 | |
Langgenius Dify Node.js | =0.10.7 | |
Langgenius Dify Node.js | =0.10.8 | |
Langgenius Dify Node.js | =0.10.9 | |
Langgenius Dify Node.js | =0.10.10 | |
Langgenius Dify Node.js | =0.10.11 | |
Langgenius Dify Node.js | =0.10.12 | |
Langgenius Dify Node.js | =0.10.13 | |
Langgenius Dify Node.js | =0.10.14 | |
Langgenius Dify Node.js | =0.10.15 | |
Langgenius Dify Node.js | =0.10.16 | |
Langgenius Dify Node.js | =0.10.16-isaacs-manual | |
Langgenius Dify Node.js | =0.10.17 | |
Langgenius Dify Node.js | =0.10.18 | |
Langgenius Dify Node.js | =0.10.19 | |
Langgenius Dify Node.js | =0.10.20 | |
Langgenius Dify Node.js | =0.10.21 | |
Langgenius Dify Node.js | =0.10.22 | |
Langgenius Dify Node.js | =0.10.23 | |
Langgenius Dify Node.js | =0.10.24 | |
Langgenius Dify Node.js | =0.10.25 | |
Langgenius Dify Node.js | =0.10.26 | |
Langgenius Dify Node.js | =0.10.27 | |
Langgenius Dify Node.js | =0.10.28 | |
Langgenius Dify Node.js | =0.10.29 | |
Langgenius Dify Node.js | =0.10.30 | |
Langgenius Dify Node.js | =0.10.31 | |
Langgenius Dify Node.js | =0.10.32 | |
Langgenius Dify Node.js | =0.10.33 | |
Langgenius Dify Node.js | =0.10.34 | |
Langgenius Dify Node.js | =0.10.35 | |
Langgenius Dify Node.js | =0.10.36 | |
Langgenius Dify Node.js | =0.10.37 | |
Langgenius Dify Node.js | =0.10.38 | |
Langgenius Dify Node.js | =0.10.39 | |
Langgenius Dify Node.js | =0.10.40 | |
Langgenius Dify Node.js | =0.10.41 | |
Langgenius Dify Node.js | =0.10.42 | |
Langgenius Dify Node.js | =0.10.43 | |
Langgenius Dify Node.js | =0.10.44 | |
Langgenius Dify Node.js | =0.10.45 | |
Langgenius Dify Node.js | =0.10.46 | |
SUSE Linux Enterprise Server | =12.0 | |
Langgenius Dify Node.js | =0.12.0 | |
Langgenius Dify Node.js | =0.12.1 | |
Langgenius Dify Node.js | =0.12.2 | |
Langgenius Dify Node.js | =0.12.3 | |
Langgenius Dify Node.js | =0.12.4 | |
Langgenius Dify Node.js | =0.12.5 | |
Langgenius Dify Node.js | =0.12.6 | |
Langgenius Dify Node.js | =0.12.7 | |
Langgenius Dify Node.js | =0.12.8 | |
Langgenius Dify Node.js | =0.12.9 | |
Langgenius Dify Node.js | =0.12.10 | |
Langgenius Dify Node.js | =0.12.11 | |
Langgenius Dify Node.js | =0.12.12 | |
Langgenius Dify Node.js | =0.12.13 | |
Langgenius Dify Node.js | =0.12.14 | |
Langgenius Dify Node.js | =0.12.15 | |
Langgenius Dify Node.js | =6.0.0 | |
Langgenius Dify Node.js | =6.1.0 | |
Langgenius Dify Node.js | =6.2.0 | |
Langgenius Dify Node.js | =6.2.1 | |
Langgenius Dify Node.js | =6.2.2 | |
Langgenius Dify Node.js | =6.3.0 | |
Langgenius Dify Node.js | =6.3.1 | |
Langgenius Dify Node.js | =6.4.0 | |
Langgenius Dify Node.js | =6.5.0 | |
Langgenius Dify Node.js | =6.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5325 is considered to have a moderate severity level due to the potential for HTTP response splitting attacks.
To fix CVE-2016-5325, upgrade Node.js to versions 0.10.47, 0.12.16, 4.6.0, or 6.7.0 or later.
CVE-2016-5325 allows attackers to inject arbitrary HTTP headers, potentially leading to cache poisoning and other related attacks.
CVE-2016-5325 affects Node.js versions prior to 0.10.47, 0.12.16, 4.6.0, and 6.7.0.
Mitigating CVE-2016-5325 without upgrading Node.js is challenging; it's best to upgrade to the fixed versions.