{
  "threat_severity" : "Moderate",
  "public_date" : "2018-06-13T00:00:00Z",
  "bugzilla" : {
    "description" : "vertx: Improper neutralization of CRLF sequences allows remote attackers to inject arbitrary HTTP response headers",
    "id" : "1591072",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1591072"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.3",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-113",
  "details" : [ "In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response." ],
  "statement" : "While the affected artifact is being shipped in Fuse 6.3 via camel-vertx component, the vulnerable code is not being used, therefore Fuse 6.3 is not affected.",
  "affected_release" : [ {
    "product_name" : "Red Hat Fuse 7.2",
    "release_date" : "2018-12-04T00:00:00Z",
    "advisory" : "RHSA-2018:3768",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7",
    "package" : "vertx"
  }, {
    "product_name" : "Text-Only RHOAR",
    "release_date" : "2018-08-09T00:00:00Z",
    "advisory" : "RHSA-2018:2371",
    "cpe" : "cpe:/a:redhat:openshift_application_runtimes:1.0",
    "package" : "vertx"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat JBoss Fuse 6",
    "fix_state" : "Not affected",
    "package_name" : "vertx",
    "cpe" : "cpe:/a:redhat:jboss_fuse:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2018-12537\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-12537\nhttps://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt" ],
  "name" : "CVE-2018-12537",
  "csaw" : false
}