6.1
CVSSv3

CVE-2016-5325

Published: 10/10/2016 Updated: 05/01/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x prior to 0.10.47, 0.12.x prior to 0.12.16, 4.x prior to 4.6.0, and 6.x prior to 6.7.0 allows remote malicious users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.

Vulnerable Product Search on Vulmon Subscribe to Product

nodejs node.js 4.3.0

nodejs node.js 4.4.4

nodejs node.js 4.4.5

nodejs node.js 4.2.3

nodejs node.js 4.2.2

nodejs node.js 4.4.0

nodejs node.js 4.4.1

nodejs node.js 4.5.0

nodejs node.js 4.2.6

nodejs node.js 4.1.1

nodejs node.js 4.1.0

nodejs node.js 4.4.2

nodejs node.js 4.4.3

nodejs node.js 4.2.5

nodejs node.js 4.2.4

nodejs node.js 4.0.0

nodejs node.js 4.3.1

nodejs node.js 4.3.2

nodejs node.js 4.4.6

nodejs node.js 4.4.7

nodejs node.js 4.2.1

nodejs node.js 4.2.0

nodejs node.js 4.1.2

nodejs node.js 0.10.42

nodejs node.js 0.10.43

nodejs node.js 0.10.6

nodejs node.js 0.10.5

nodejs node.js 0.10.36

nodejs node.js 0.10.35

nodejs node.js 0.10.28

nodejs node.js 0.10.27

nodejs node.js 0.10.20

nodejs node.js 0.10.2

nodejs node.js 0.10.14

nodejs node.js 0.10.13

nodejs node.js 0.10.12

nodejs node.js 0.10.46

nodejs node.js 0.10.9

nodejs node.js 0.10.4

nodejs node.js 0.10.39

nodejs node.js 0.10.8

nodejs node.js 0.10.7

nodejs node.js 0.10.38

nodejs node.js 0.10.37

nodejs node.js 0.10.31

nodejs node.js 0.10.30

nodejs node.js 0.10.24

nodejs node.js 0.10.23

nodejs node.js 0.10.17

nodejs node.js 0.10.16-isaacs-manual

nodejs node.js 0.10.1

nodejs node.js 0.10.0

nodejs node.js 0.10.3

nodejs node.js 0.10.29

nodejs node.js 0.10.22

nodejs node.js 0.10.21

nodejs node.js 0.10.16

nodejs node.js 0.10.15

nodejs node.js 0.10.44

nodejs node.js 0.10.45

nodejs node.js 0.10.41

nodejs node.js 0.10.40

nodejs node.js 0.10.34

nodejs node.js 0.10.33

nodejs node.js 0.10.32

nodejs node.js 0.10.26

nodejs node.js 0.10.25

nodejs node.js 0.10.19

nodejs node.js 0.10.18

nodejs node.js 0.10.11

nodejs node.js 0.10.10

suse linux enterprise 12.0

nodejs node.js 0.12.10

nodejs node.js 0.12.8

nodejs node.js 0.12.7

nodejs node.js 0.12.13

nodejs node.js 0.12.14

nodejs node.js 0.12.4

nodejs node.js 0.12.3

nodejs node.js 0.12.15

nodejs node.js 0.12.9

nodejs node.js 0.12.2

nodejs node.js 0.12.1

nodejs node.js 0.12.0

nodejs node.js 0.12.11

nodejs node.js 0.12.12

nodejs node.js 0.12.6

nodejs node.js 0.12.5

nodejs node.js 6.1.0

nodejs node.js 6.5.0

nodejs node.js 6.6.0

nodejs node.js 6.2.2

nodejs node.js 6.3.0

nodejs node.js 6.3.1

nodejs node.js 6.4.0

nodejs node.js 6.2.0

nodejs node.js 6.2.1

nodejs node.js 6.0.0

Vendor Advisories

Debian Bug report logs - #839714 CVE-2016-5325 / CVE-2016-7099 Package: src:nodejs; Maintainer for src:nodejs is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 4 Oct 2016 09:15:01 UTC Severity: grave Tags: security Fixed in v ...
Synopsis Important: rh-nodejs4-nodejs and rh-nodejs4-http-parser security update Type/Severity Security Advisory: Important Topic An update for rh-nodejs4-nodejs and rh-nodejs4-http-parser is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security i ...
Synopsis Moderate: nodejs and nodejs-tough-cookie security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for nodejs-tough-cookie and nodejs is now available for Red Hat OpenShift Container Platform 31, 32, and 33Red Hat Product Security has rated this update ...
It was found that the reason argument in ServerResponse#writeHead() was not properly validated A remote attacker could possibly use this flaw to conduct an HTTP response splitting attack via a specially-crafted HTTP request ...