CVE-2016-6484

CRLF injection vulnerability in Infoblox Network Automation NetMRI before 7.1.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the contentType parameter in a login action to config/userAdmin/login.tdf.
Configurations

Configuration 1 (hide)

cpe:2.3:a:infoblox:netmri:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:56

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/138615/Infoblox-7.0.1-CRLF-Injection-HTTP-Response-Splitting.html - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/539366/100/0/threaded - () http://www.securityfocus.com/archive/1/539366/100/0/threaded -
References () http://www.securityfocus.com/bid/92794 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92794 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1036736 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1036736 - Third Party Advisory, VDB Entry

Information

Published : 2017-01-23 21:59

Updated : 2024-11-21 02:56


NVD link : CVE-2016-6484

Mitre link : CVE-2016-6484

CVE.ORG link : CVE-2016-6484


JSON object : View

Products Affected

infoblox

  • netmri
CWE
CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')