CVE-2013-2950
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
03/06/2013
Last modified:
11/04/2025
Description
CRLF injection vulnerability in IBM WebSphere Portal 6.1.0.x before 6.1.0.3 CF26, 6.1.5.x before 6.1.5 CF26, 7.0.0.x before 7.0.0.2 CF21, and 8.0.0.x through 8.0.0.1 CF5, when home substitution (aka uri.home.substitution) is enabled, allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
Impact
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:ibm:websphere_portal:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf01:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf02:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf03:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf04:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.0:cf05:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf04:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:8.0.0.1:cf05:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:7.0.0.0:cf001:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf002:*:*:*:*:*:* | ||
| cpe:2.3:a:ibm:websphere_portal:7.0.0.1:cf003:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM85071
- http://www-01.ibm.com/support/docview.wss?uid=swg21638864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83618
- http://www-01.ibm.com/support/docview.wss?uid=swg1PM85071
- http://www-01.ibm.com/support/docview.wss?uid=swg21638864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/83618



