A vulnerability in the web server of Cisco Umbrella could allow an unauthenticated, remote attacker to perform a carriage return line feed (CRLF) injection attack against a user of an affected service. The vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user to access a crafted URL. A successful exploit could allow the attacker to inject arbitrary HTTP headers into valid HTTP responses sent to the browser of the user.
                
            References
                    | Link | Resource | 
|---|---|
| https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-umbrella-head-inject-n4QArJH | Vendor Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2020-05-06 17:15
Updated : 2020-05-12 17:34
NVD link : CVE-2020-3246
Mitre link : CVE-2020-3246
CVE.ORG link : CVE-2020-3246
JSON object : View
Products Affected
                cisco
- umbrella
 
