Summary
Xerver is prone to an HTTP response-splitting vulnerability because it fails to sufficiently sanitize user-supplied data.
Attackers can leverage this issue to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.
The issue affects Xerver 4.31 and 4.32
other versions may also
be affected.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2009-4086 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities