CVE-2017-12309

A vulnerability in the Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to conduct a HTTP response splitting attack. The vulnerability is due to the failure of the application or its environment to properly sanitize input values. An attacker could exploit this vulnerability by injecting malicious HTTP headers, controlling the response body, or splitting the response into multiple responses. An exploit could allow the attacker to perform cross-site scripting attacks, cross-user defacement, web cache poisoning, and similar exploits. Cisco Bug IDs: CSCvf16705.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:cisco:email_security_appliance_firmware:10.0.2-020:*:*:*:*:*:*:*
cpe:2.3:o:cisco:email_security_appliance_firmware:11.0.0-105:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/101928 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101928 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039831 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039831 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-esa - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171115-esa - Vendor Advisory

Information

Published : 2017-11-16 07:29

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12309

Mitre link : CVE-2017-12309

CVE.ORG link : CVE-2017-12309


JSON object : View

Products Affected

cisco

  • email_security_appliance_firmware
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')