Severity

5.3

Vulnerability Type

Improper Input Validation (CWE-20)

Summary

An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.