IBM Aspera Faspex 5.0.x HTTP Header Injection via HOST header
CVE-2022-22399 Published on March 5, 2024
IBM Aspera Faspex HTTP header injection
IBM Aspera Faspex 5.0.0 and 5.0.1 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. IBM X-Force ID: 222562.
Vulnerability Analysis
CVE-2022-22399 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Improper Neutralization of HTTP Headers for Scripting Syntax
The application does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web browser components that can process raw headers, such as Flash.
Products Associated with CVE-2022-22399
Want to know whenever a new CVE is published for IBM Aspera Faspex? stack.watch will email you.
Affected Versions
IBM Aspera Faspex Version 5.0.0, 5.0.1 is affected by CVE-2022-22399Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.