CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Lifecycle Timeline
4Description
IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers. This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
Analysis
HTTP header injection in IBM Aspera Shares 1.9.9 through 1.11.0 allows authenticated attackers to conduct cross-site scripting, cache poisoning, and session hijacking attacks via improper validation of HOST headers. The vulnerability requires authenticated access and carries a CVSS score of 5.4 with moderate confidentiality and integrity impact. No public exploit code or active exploitation has been confirmed.
Technical Context
IBM Aspera Shares is vulnerable to HTTP header injection due to insufficient input validation of HOST headers (CWE-644: Improper Validation of HTTP Request Header Fields). This class of vulnerability occurs when user-supplied data is included in HTTP response headers without proper sanitization, allowing attackers to inject arbitrary header values. The affected technology spans Aspera Shares versions 1.9.9 through 1.11.0. The vulnerability can be chained with browser-based attacks such as XSS when injected headers influence how user content is rendered, or exploited to manipulate cache behavior and session tokens through header manipulation.
Affected Products
IBM Aspera Shares versions 1.9.9 through 1.11.0 are affected. The CPE identifier cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:* covers all configurations of the affected version range. Organizations using any release within this window require remediation.
Remediation
Upgrade IBM Aspera Shares to version 1.11.1 or later, as patches are available from IBM per vendor advisory at https://www.ibm.com/support/pages/node/7267848. Immediately apply the security update to all deployed instances, prioritizing systems handling sensitive data or exposed to untrusted user populations. Review HTTP header handling in proxy and load balancer configurations to ensure no downstream systems are replicating unsanitized HOST headers. If immediate patching is not feasible, restrict access to Aspera Shares to trusted internal networks and audit authentication logs for suspicious header manipulation attempts.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209182