First published: Fri Jul 08 2022(Updated: )
IBM Engineering Lifecycle Optimization - Publishing 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 213866.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM RPE | =6.0.6 | |
IBM RPE | =6.0.6.1 | |
IBM RPE | =7.0 | |
IBM RPE | =7.0.1 | |
IBM RPE | =7.0.2 | |
Linux Linux kernel | ||
Microsoft Windows | ||
<=7.0.1 | ||
<=7.0.2 | ||
<=6.0.6 | ||
<=6.0.6.1 | ||
<=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-39028.
The title of this vulnerability is 'IBM Engineering Lifecycle Optimization - Publishing is vulnerable to HTTP header injection caused by…'
The affected software includes IBM Engineering Lifecycle Optimization - Publishing versions 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2.
The severity of this vulnerability is medium with a CVSS score of 5.4.
This vulnerability can be exploited by conducting various attacks against the vulnerable system, including cross-site scripting (XSS) and HTTP header injection.