CRLF vulnerability in Reprise License Manager (RLM) web interface through 14.2BL4 in the password parameter in View License Result function, that allows remote attackers to inject arbitrary HTTP headers.
References
Link | Resource |
---|---|
http://reprise.com | Not Applicable |
http://reprisesoftware.com | Product |
https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md | Third Party Advisory |
http://reprise.com | Not Applicable |
http://reprisesoftware.com | Product |
https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md | Third Party Advisory |
Configurations
History
21 Nov 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://reprise.com - Not Applicable | |
References | () http://reprisesoftware.com - Product | |
References | () https://github.com/blakduk/Advisories/blob/main/Reprise%20License%20Manager/README.md - Third Party Advisory | |
Summary |
|
Information
Published : 2023-01-20 12:15
Updated : 2024-11-21 06:15
NVD link : CVE-2021-37499
Mitre link : CVE-2021-37499
CVE.ORG link : CVE-2021-37499
JSON object : View
Products Affected
reprisesoftware
- reprise_license_manager
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')