CRLF injection vulnerability in the redirect feature in Sun Java System Web Server 6.1 and 7.0 before 20070802, when the redirect Server Application Function (SAF) uses the url-prefix parameter and escape is disabled, or an Error directive uses the url-prefix parameter in obj.conf, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks.
| Software | From | Fixed in |
|---|---|---|
| sun / java_system_web_server | 6.1-sp1 | 6.1-sp1.x |
| sun / java_system_web_server | 6.1-sp6 | 6.1-sp6.x |
| sun / java_system_web_server | 6.1-sp3 | 6.1-sp3.x |
| sun / java_system_web_server | 6.1 | 6.1.x |
| sun / java_system_web_server | 6.1-sp4 | 6.1-sp4.x |
| sun / java_system_web_server | 6.1-sp5 | 6.1-sp5.x |
| sun / java_system_web_server | 7.0 | 7.0.x |
| sun / java_system_web_server | 6.1-sp2 | 6.1-sp2.x |
| sun / java_system_web_server | 6.1-sp7 | 6.1-sp7.x |