CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Lifecycle Timeline
4Description
IBM InfoSphere Information Server 11.7.0.0 through 11.7.1.6 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
Analysis
IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 contain an HTTP header injection vulnerability caused by improper validation of the HOST header, allowing unauthenticated remote attackers to conduct cross-site scripting (XSS), cache poisoning, and session hijacking attacks. A vendor patch is available, and while this vulnerability is not currently listed as actively exploited in CISA's Known Exploited Vulnerabilities catalog, the CVSS score of 6.5 with network accessibility and low attack complexity indicates moderate real-world risk.
Technical Context
The vulnerability exists in IBM InfoSphere Information Server, an enterprise data integration and governance platform (CPE: cpe:2.3:a:ibm:infosphere_information_server). The root cause is classified under CWE-644 (Improper Validation of HTTP Request Header for URL Redirection), which occurs when user-controlled input from HTTP headers—specifically the HOST header—is not properly sanitized before being reflected in responses or used in security-sensitive operations. This allows attackers to inject arbitrary header content, which can be leveraged for cache poisoning (by injecting Set-Cookie or other directives), session hijacking (by manipulating authentication headers), and reflective XSS attacks (by injecting content into Location headers or response bodies derived from the HOST header).
Affected Products
IBM InfoSphere Information Server versions 11.7.0.0 through 11.7.1.6 are affected, as indicated by the CPE cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:* and the vendor advisory. The affected version range spans multiple point releases within the 11.7 product line. Organizations should verify their installed version against the complete list provided in the IBM support advisory at https://www.ibm.com/support/pages/node/7267526 to determine exposure.
Remediation
Upgrade IBM InfoSphere Information Server to version 11.7.1.7 or later, which includes the security fix for HTTP header injection. Refer to the official IBM security advisory and patch download portal at https://www.ibm.com/support/pages/node/7267526 for detailed upgrade instructions. As interim mitigations pending patching, implement a reverse proxy or WAF configured to validate and sanitize the HOST header, restrict access to InfoSphere administrative and API endpoints to trusted IP ranges, enforce HTTPS with HSTS to prevent header-based cache poisoning, and monitor HTTP access logs for suspicious HOST header patterns.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209014