First published: Thu Nov 16 2017(Updated: )
A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Email Security Appliance Firmware | =10.0.2-020 | |
Cisco Email Security Appliance Firmware | =11.0.0-105 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2017-12309.
The severity of CVE-2017-12309 is medium with a severity value of 5.3.
An attacker can exploit CVE-2017-12309 by conducting a HTTP response splitting attack.
The Cisco Email Security Appliance Firmware versions 10.0.2-020 and 11.0.0-105 are affected by CVE-2017-12309.
To fix CVE-2017-12309, Cisco recommends upgrading to a fixed software version.