Summary
Xerver is prone to an HTTP response-splitting vulnerability because it fails to sufficiently sanitize user-supplied data.
Attackers can leverage this issue to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.
The issue affects Xerver 4.31 and 4.32
other versions may also
be affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-4086 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
- Apache HTTP Server 'mod_dav_svn' Denial of Service Vulnerability (Windows)
- Apache 'Options' and 'AllowOverride' Directives Security Bypass Vulnerability
- F*EX (Frams's Fast File EXchange) Multiple XSS Vulnerabilities
- Home Web Server Graphical User Interface Remote Denial Of Service Vulnerability