ID CVE-2016-0359
Summary CRLF injection vulnerability in IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.43, 8.0 before 8.0.0.13, 8.5 Full before 8.5.5.10, and 8.5 Liberty before Liberty Fix Pack 16.0.0.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.
References
Vulnerable Configurations
  • IBM WebSphere Application Server 8.5.0.0 Liberty Profile
    cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:-:liberty_profile
  • IBM WebSphere Application Server 8.5.5.9
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.9
  • IBM Websphere Application Server 8.5.5.8
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.8
  • IBM Websphere Application Server 8.5.5.7
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.7
  • IBM WebSphere Application Server 8.5.5.6
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.6
  • IBM WebSphere Application Server 8.5.5.5
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.5
  • IBM Websphere Application Server 8.5.5.4
    cpe:2.3:a:ibm:websphere_application_server:8.5.5.4
  • IBM WebSphere Application Server 8.5.0.0
    cpe:2.3:a:ibm:websphere_application_server:8.5.0.0
  • IBM WebSphere Application Server 8.0.0.9
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.9
  • IBM WebSphere Application Server 8.0.0.8 (Fix Pack 8)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.8
  • IBM WebSphere Application Server 8.0.0.7 (Fix Pack 7)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.7
  • IBM WebSphere Application Server 8.0.0.6 (Fix Pack 6)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.6
  • IBM WebSphere Application Server 8.0.0.5 (FixPack 5)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.5
  • IBM WebSphere Application Server 8.0.0.4 (Fix Pack 4)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.4
  • IBM WebSphere Application Server 8.0.0.3 (Fix Pack 3)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.3
  • IBM WebSphere Application Server 8.0.0.2 (Fix Pack 2)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.2
  • IBM WebSphere Application Server 8.0.0.12
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.12
  • IBM Websphere Application Server 8.0.0.11
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.11
  • IBM WebSphere Application Server 8.0.0.10 (Fix Pack 10)
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.10
  • IBM WebSphere Application Server 8.0.0.1
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.1
  • IBM WebSphere Application Server 8.0.0.0
    cpe:2.3:a:ibm:websphere_application_server:8.0.0.0
  • IBM WebSphere Application Server 8.0
    cpe:2.3:a:ibm:websphere_application_server:8.0
  • IBM Websphere Application Server 7.0.0.39
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.39
  • IBM WebSphere Application Server 7.0.0.9 (Fix Pack 9)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.9
  • IBM WebSphere Application Server 7.0.0.8
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.8
  • IBM WebSphere Application Server 7.0.0.7
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.7
  • IBM WebSphere Application Server 7.0.0.6
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.6
  • IBM WebSphere Application Server 7.0.0.5
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.5
  • IBM WebSphere Application Server 7.0.0.4
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.4
  • IBM Websphere Application Server 7.0.0.41
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.41
  • IBM WebSphere Application Server 7.0.0.38
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.38
  • IBM WebSphere Application Server 7.0.0.37
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.37
  • IBM WebSphere Application Server 7.0.0.36
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.36
  • IBM Websphere Application Server 7.0.0.35
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.35
  • IBM WebSphere Application Server 7.0.0.34
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.34
  • IBM WebSphere Application Server 7.0.0.33
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.33
  • IBM WebSphere Application Server 7.0.0.32
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.32
  • IBM WebSphere Application Server 7.0.0.31 (Fix Pack 31)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.31
  • IBM WebSphere Application Server 7.0.0.3
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.3
  • IBM WebSphere Application Server 7.0.0.29 (Fix Pack 29)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.29
  • cpe:2.3:a:ibm:websphere_application_server:7.0.0.28
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.28
  • IBM WebSphere Application Server 7.0.0.27 (Fix Pack 27)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.27
  • IBM WebSphere Application Server 7.0.0.25 (Fix Pack 25)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.25
  • IBM WebSphere Application Server 7.0.0.24
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.24
  • IBM WebSphere Application Server 7.0.0.23
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.23
  • IBM WebSphere Application Server 7.0.0.22
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.22
  • IBM WebSphere Application Server 7.0.0.21
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.21
  • IBM WebSphere Application Server 7.0.0.2
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.2
  • IBM WebSphere Application Server 7.0.0.19 (Fix Pack 19)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.19
  • IBM WebSphere Application Server 7.0.0.18 (Fix Pack 18)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.18
  • IBM WebSphere Application Server 7.0.0.17 (Fix Pack 17)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.17
  • IBM WebSphere Application Server 7.0.0.16 (Fix Pack 16)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.16
  • IBM WebSphere Application Server 7.0.0.15 (Fix Pack 15)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.15
  • IBM WebSphere Application Server 7.0.0.14 (Fix Pack 14)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.14
  • IBM WebSphere Application Server 7.0.0.13 (Fix Pack 13)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.13
  • IBM WebSphere Application Server 7.0.0.12
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.12
  • IBM WebSphere Application Server 7.0.0.11 (Fix Pack 11)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.11
  • IBM WebSphere Application Server 7.0.0.10 (Fix Pack 10)
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.10
  • IBM WebSphere Application Server 7.0.0.1
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.1
  • IBM Websphere Application Server 7.0.0.0
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.0
  • IBM WebSphere Application Server 7.0
    cpe:2.3:a:ibm:websphere_application_server:7.0
CVSS
Base: 4.3 (as of 05-07-2016 - 13:16)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
NASL family Web Servers
NASL id WEBSPHERE_16_0_0_2.NASL
description The IBM WebSphere Application Server running on the remote host is version 7.0 prior to 7.0.0.43, 8.0 prior to 8.0.0.13, 8.5 prior to 8.5.5.10, or 16.0 (Liberty) prior to 16.0.0.2. It is, therefore, affected by an HTTP response splitting vulnerability due to a failure to properly sanitize CRLF character sequences before user-supplied input is included in HTTP responses. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted URL link, to inject arbitrary HTTP headers.
last seen 2019-02-21
modified 2018-08-07
plugin id 92724
published 2016-08-04
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=92724
title IBM WebSphere Application Server 7.0 < 7.0.0.43 / 8.0 < 8.0.0.13 / 8.5 < 8.5.5.10 / Liberty 16.0 < 16.0.0.2 CRLF Sequences HTTP Response Splitting
refmap via4
aixapar PI58918
bid 91484
confirm http://www-01.ibm.com/support/docview.wss?uid=swg21982526
sectrack 1036184
Last major update 28-11-2016 - 14:53
Published 03-07-2016 - 17:59
Last modified 31-08-2017 - 21:29
Back to Top