First published: Fri Sep 13 2019(Updated: )
Some web components in the ArubaOS software are vulnerable to HTTP Response splitting (CRLF injection) and Reflected XSS. An attacker would be able to accomplish this by sending certain URL parameters that would trigger this vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS | <6.4.4.20 | |
ArubaOS | >=6.5.4.0<6.5.4.11 | |
ArubaOS | >=6.5.4.12<8.2.1.0 | |
ArubaOS | >=8.2.1.1<8.3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5314 is classified as a high severity vulnerability due to the potential for Reflected XSS and HTTP Response splitting.
To fix CVE-2019-5314, update ArubaOS to version 6.4.4.20 or later, or 6.5.4.11 or later, or 8.2.1.0 or later, dependent on your current version.
The risks associated with CVE-2019-5314 include unauthorized data access and the potential execution of malicious scripts in user's browsers.
CVE-2019-5314 affects ArubaOS versions prior to 6.4.4.20, between 6.5.4.0 and 6.5.4.11, between 6.5.4.12 and 8.2.1.0, and between 8.2.1.1 and 8.3.0.0.
By exploiting CVE-2019-5314, an attacker can manipulate the response headers and execute XSS attacks on users.