First published: Sun Aug 22 2021(Updated: )
Canon Oce Print Exec Workgroup 1.3.2 allows Host header injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Canon Oce Print Exec Workgroup | =1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Canon Oce Print Exec Workgroup is CVE-2021-39367.
The severity rating of CVE-2021-39367 is medium with a score of 5.3.
The impact of the Host header injection vulnerability in Canon Oce Print Exec Workgroup 1.3.2 could allow an attacker to manipulate the Host header, potentially leading to various malicious activities like HTTP response splitting and session hijacking.
To fix the Host header injection vulnerability in Canon Oce Print Exec Workgroup 1.3.2, it is recommended to update to a patched version provided by Canon or implement appropriate security measures to sanitize and validate user-supplied input in the Host header.
You can find more information about the Canon Oce Print Exec Workgroup vulnerability at the following link: [https://github.com/IthacaLabs/Canon/tree/main/OCE_Print_Exec_Workgroup_Version_1_3_2/HHI](https://github.com/IthacaLabs/Canon/tree/main/OCE_Print_Exec_Workgroup_Version_1_3_2/HHI)