CVE-2011-2732
Published Dec 5, 2012
Last updated 12 years ago
Overview
- Description
- CRLF injection vulnerability in the logout functionality in VMware SpringSource Spring Security before 2.0.7 and 3.0.x before 3.0.6 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the spring-security-redirect parameter.
- Source
- secalert@redhat.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-94
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0758437-7387-404F-9AC8-DFE044F713D8", "versionEndIncluding": "2.0.6" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D24B6283-AC10-411C-BC40-FF9CDD4984EE", "versionEndIncluding": "3.0.5" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49404CD7-2E0D-479C-AAC4-0B84AEFB724E" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D78BB50-F222-46BC-AEAA-8B1DADE2E38C" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49CC9A95-6EA8-4F95-BBD1-D306D831636D" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F694360-D48E-4ECB-9B32-8A83803E0A68" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EE84C44-3D48-4F5B-B168-80F583E84C04" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C672302-C952-4EC0-A833-34382F7CC47A" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D802BACB-E48F-4430-9C93-5029B596DDBA" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FED53F75-200C-40F4-A282-E0DBDBDB4DE1" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DD07175-064C-46D2-B76A-17A642FB7D75" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E96BD784-6C39-4FC2-AF5D-C21465D17925" }, { "criteria": "cpe:2.3:a:vmware:springsource_spring_security:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08A9A32B-E092-4016-8D63-4CAA52FA8421" } ], "operator": "OR" } ] } ]