CRLF injection vulnerability in the redirect feature in Sun Java System Web Server 6.1 and 7.0 before 20070802, when the redirect Server Application Function (SAF) uses the url-prefix parameter and escape is disabled, or an Error directive uses the url-prefix parameter in obj.conf, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks.
2007-08-07T10:17:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 6.1 | Yes |
Application | sun | java_system_web_server | 7.0 | Yes |