CRLF injection vulnerability in the redirect feature in Sun Java System Web Server 6.1 and 7.0 before 20070802, when the redirect Server Application Function (SAF) uses the url-prefix parameter and escape is disabled, or an Error directive uses the url-prefix parameter in obj.conf, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Java_system_web_server | Sun | 6.1 (including) | 6.1 (including) |
Java_system_web_server | Sun | 6.1-sp1 (including) | 6.1-sp1 (including) |
Java_system_web_server | Sun | 6.1-sp2 (including) | 6.1-sp2 (including) |
Java_system_web_server | Sun | 6.1-sp3 (including) | 6.1-sp3 (including) |
Java_system_web_server | Sun | 6.1-sp4 (including) | 6.1-sp4 (including) |
Java_system_web_server | Sun | 6.1-sp5 (including) | 6.1-sp5 (including) |
Java_system_web_server | Sun | 6.1-sp6 (including) | 6.1-sp6 (including) |
Java_system_web_server | Sun | 6.1-sp7 (including) | 6.1-sp7 (including) |
Java_system_web_server | Sun | 7.0 (including) | 7.0 (including) |