A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.
References
Configurations
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-head-inject-n4QArJH - Vendor Advisory |
Information
Published : 2020-05-06 17:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3246
Mitre link : CVE-2020-3246
CVE.ORG link : CVE-2020-3246
JSON object : View
Products Affected
cisco
- umbrella