Lucene search

K
ciscoCiscoCISCO-SA-UMBRELLA-HEAD-INJECT-N4QARJH
HistoryMay 06, 2020 - 4:00 p.m.

Cisco Umbrella Carriage Return Line Feed Injection Vulnerability

2020-05-0616:00:00
tools.cisco.com
8

0.001 Low

EPSS

Percentile

46.9%

A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service.

The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-head-inject-n4QArJH [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-head-inject-n4QArJH”]

Affected configurations

Vulners
Node
ciscoumbrellaMatchany
OR
ciscoumbrellaMatchany
CPENameOperatorVersion
cisco umbrellaeqany
cisco umbrellaeqany

0.001 Low

EPSS

Percentile

46.9%

Related for CISCO-SA-UMBRELLA-HEAD-INJECT-N4QARJH