First published: Wed Dec 20 2017(Updated: )
IBM Security Guardium 10.0 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 124737.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | =10.0 | |
IBM InfoSphere Guardium z/OS | =10.0.1 | |
IBM InfoSphere Guardium z/OS | =10.1.0 | |
IBM InfoSphere Guardium z/OS | =10.1.2 | |
IBM InfoSphere Guardium z/OS | =10.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1262 has a medium severity rating due to the potential for HTTP response splitting attacks.
To mitigate CVE-2017-1262, apply the latest patches provided by IBM for the affected versions of Security Guardium.
CVE-2017-1262 affects IBM Security Guardium versions 10.0, 10.0.1, 10.1.0, 10.1.2, and 10.1.3.
An attacker exploiting CVE-2017-1262 can cause the server to return a split HTTP response, facilitating further attacks.
Currently, the recommended action is to update to the latest version of IBM Security Guardium, as a direct workaround is not specified.