HTTP: Spring Security HTTP Header Injection

This signature detects attempts to exploit a known vulnerability against Spring Security. It is due to insufficient validation of CRLF characters passed to the "spring-security-redirect" parameter of the logout URI. Attackers can launch various attacks by injecting arbitrary HTTP headers.

Extended Description

Spring Security is prone to a vulnerability that allows attackers to inject arbitrary HTTP headers because it fails to sufficiently sanitize input. By inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. The following versions are vulnerable: Spring Security 2.0.0 through 2.0.6 Spring Security 3.0.0 through 3.0.5

Affected Products

Springsource spring_security

Short Name
HTTP:MISC:SPRING-HEADER-INJ
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2011-2732 HTTP Header Injection Security Spring bid:49535
Release Date
09/13/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Springsource

CVSS Score

4.3

Found a potential security threat?