First published: Fri May 26 2017(Updated: )
IBM Maximo Asset Management 7.5 and 7.6 is vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 125152.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Maximo Asset Management | =7.5 | |
IBM Maximo Asset Management | =7.6 | |
Ibm Maximo Asset Management Essentials | =7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1291 is considered a medium severity vulnerability due to its potential to enable HTTP response splitting attacks.
CVE-2017-1291 allows an attacker to craft a specially-designed URL that can cause the server to send a split HTTP response.
CVE-2017-1291 affects IBM Maximo Asset Management versions 7.5 and 7.6, as well as IBM Maximo Asset Management Essentials version 7.5.
To mitigate CVE-2017-1291, it is recommended to apply security patches provided by IBM or to upgrade to a non-vulnerable version of the software.
Yes, CVE-2017-1291 is exploitable remotely, allowing attackers to execute the attack without direct access to the target system.