Severity

5.3

Vulnerability Type

Improper Input Validation (CWE-20) external link

Summary

An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.