fkie_cve-2016-4975
Vulnerability from fkie_nvd
Published
2018-08-14 12:29
Modified
2024-11-21 02:53
Severity ?
Summary
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", matchCriteriaId: "67AD11FB-529C-404E-A13B-284F145322B8", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", matchCriteriaId: "CCBBB7FE-35FC-4515-8393-5145339FCE4D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", matchCriteriaId: "F519633F-AB68-495A-B85E-FD41F9F752CA", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", matchCriteriaId: "A894BED6-C97D-4DA4-A13D-9CB2B3306BC5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", matchCriteriaId: "34A847D1-5AD5-4EFD-B165-7602AFC1E656", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", matchCriteriaId: "9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", matchCriteriaId: "AB63EBE5-CF14-491E-ABA5-67116DFE3E5B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*", matchCriteriaId: "8C2A33DE-F55F-4FD8-BB00-9C1E006CA65C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*", matchCriteriaId: "B1CF6394-95D9-42AF-A442-385EFF9CEFE1", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*", matchCriteriaId: "02B629FB-88C8-4E85-A137-28770F1E524E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*", matchCriteriaId: "03550EF0-DF89-42FE-BF0E-994514EBD947", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*", matchCriteriaId: "4886CCAB-6D4E-45C7-B177-2E8DBEA15531", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*", matchCriteriaId: "C35631AC-7C35-4F6A-A95A-3B080E5210ED", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*", matchCriteriaId: "6CED2BA6-BE5E-4EF1-88EB-0DADD23D2EEF", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*", matchCriteriaId: "A71F4154-AD20-4EEA-9E2E-D3385C357DA5", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*", matchCriteriaId: "B0B8C9DB-401E-42B3-BAED-D09A96DE9A90", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*", matchCriteriaId: "062C20A0-05A0-4164-8330-DF6ADFE607F4", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*", matchCriteriaId: "D345BA35-93BB-406F-B5DC-86E49FB29C22", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*", matchCriteriaId: "7ED4892F-C829-4BEA-AB82-6A78F6F2426D", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*", matchCriteriaId: "00128AAD-E746-4DCD-8676-1381E5232220", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*", matchCriteriaId: "FE0D7ABB-DE11-40D6-8AAF-C626DD7E3914", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*", matchCriteriaId: "5252544F-7BDD-42EE-856E-B351B4B6D381", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*", matchCriteriaId: "58375DE5-F7EC-400D-84A2-CD70B72C4F63", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*", matchCriteriaId: "15233815-C037-41BB-A447-A078F83A93F6", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*", matchCriteriaId: "5444C583-CF83-4ECD-8DF8-66D8C1FCF096", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.29:*:*:*:*:*:*:*", matchCriteriaId: "6C306D07-9DF3-4AD1-9984-ECA094D0F50E", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.2.31:*:*:*:*:*:*:*", matchCriteriaId: "513A1C46-80FF-489C-AD31-F8F790C6D6C9", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", matchCriteriaId: "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*", matchCriteriaId: "046487A3-752B-4D0F-8984-96486B828EAB", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*", matchCriteriaId: "89D2E052-51CD-4B57-A8B8-FAE51988D654", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*", matchCriteriaId: "EAA27058-BACF-4F94-8E3C-7D38EC302EC1", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", matchCriteriaId: "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", matchCriteriaId: "E7D924D1-8A36-4C43-9E56-52814F9A6350", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", matchCriteriaId: "39CDFECC-E26D-47E0-976F-6629040B3764", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*", matchCriteriaId: "E3ECBCB1-0675-41F5-857B-438F36925F63", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", matchCriteriaId: "CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*", matchCriteriaId: "8717A96B-9DB5-48D6-A2CF-A5E2B26AF3F3", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.17:*:*:*:*:*:*:*", matchCriteriaId: "E1F45B27-504B-4202-87B8-BD3B094003F1", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.18:*:*:*:*:*:*:*", matchCriteriaId: "F2FB2B98-DFD2-420A-8A7F-9B288651242F", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.20:*:*:*:*:*:*:*", matchCriteriaId: "B803D25B-0A19-4569-BA05-09D58F33917C", vulnerable: true, }, { criteria: "cpe:2.3:a:apache:http_server:2.4.23:*:*:*:*:*:*:*", matchCriteriaId: "8510442C-212F-4013-85FA-E0AB59F6F2C6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).", }, { lang: "es", value: "Posible inyección CRLF que permite ataques de separación de respuesta HTTP para los sitios que emplean mod_userdir. Este problema fue mitigado gracias a los cambios realizados en las versiones 2.4.25 y 2.2.32, que prohíben la inyección CR o LF en \"Location\" o en otro tipo de clave o valor de cabecera saliente. Esto se ha solucionado en Apache HTTP Server 2.4.25 (2.4.1-2.4.23 afectadas). Esto se ha solucionado en Apache HTTP Server 2.2.32 (2.2.0-2.2.31 afectadas).", }, ], id: "CVE-2016-4975", lastModified: "2024-11-21T02:53:20.620", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-08-14T12:29:00.220", references: [ { source: "security@apache.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/105093", }, { source: "security@apache.org", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", }, { source: "security@apache.org", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { source: "security@apache.org", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180926-0006/", }, { source: "security@apache.org", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/105093", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://security.netapp.com/advisory/ntap-20180926-0006/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us", }, ], sourceIdentifier: "security@apache.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-93", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.