First published: Fri Oct 25 2019(Updated: )
IBM Cloud Orchestrator is vulnerable to HTTP response splitting attacks, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability to inject arbitrary HTTP headers and cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning or cross-site scripting, and possibly obtain sensitive information.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cloud Orchestrator Enterprise | >=2.4.0.0<=2.4.0.5 | |
IBM Cloud Orchestrator Enterprise | >=2.4.0.0<=2.4.0.5 | |
IBM Cloud Orchestrator Enterprise | >=2.5.0.0<=2.5.0.9 | |
IBM Cloud Orchestrator Enterprise | >=2.5.0.0<=2.5.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-4396 has a medium severity rating due to its potential for HTTP response splitting attacks.
To mitigate CVE-2019-4396, ensure proper validation and sanitization of user-supplied input before processing it.
CVE-2019-4396 affects IBM Cloud Orchestrator versions from 2.4.0.0 to 2.4.0.5 and 2.5.0.0 to 2.5.0.9.
CVE-2019-4396 is associated with HTTP response splitting attacks, allowing an attacker to inject arbitrary HTTP headers.
Yes, IBM has provided fixes for CVE-2019-4396 in the later versions of the software that address the vulnerability.