CVE-2025-36227
MEDIUM
5,4
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: changed
Confidentiality: low
Integrity: low
Availability: none
Description
AI Translation Available
IBM Aspera Faspex 5 5.0.0 through 5.0.14.3 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0002
Percentile
0,1th
Updated
EPSS Score Trend (Last 5 Days)
644
Improper Neutralization of HTTP Headers for Scripting Syntax
IncompleteCommon Consequences
Security Scopes Affected:
Integrity
Confidentiality
Availability
Potential Impacts:
Execute Unauthorized Code Or Commands
Read Application Data
Applicable Platforms
Technologies:
Web Based, Web Server
Application
Aspera Faspex by Ibm
Version Range Affected
From
5.0.0
(inclusive)
To
5.0.15
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.ibm.com/support/pages/node/7262816