Vulnerability Name:

CVE-2010-1576 (CCN-60081)

Assigned:2010-07-02
Published:2010-07-02
Updated:2018-10-10
Summary:The Cisco Content Services Switch (CSS) 11500 with software before 8.20.4.02 and the Application Control Engine (ACE) 4710 with software before A2(3.0) do not properly handle use of LF, CR, and LFCR as alternatives to the standard CRLF sequence between HTTP headers, which allows remote attackers to bypass intended header insertions or conduct HTTP request smuggling attacks via crafted header data, as demonstrated by LF characters preceding ClientCert-Subject and ClientCert-Subject-CN headers, aka Bug ID CSCta04885.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
7.1 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-1576

Source: OSVDB
Type: UNKNOWN
66092

Source: CCN
Type: SECTRACK ID: 1024167
Cisco Content Services Switch HTTP and ClientCert Headers Can Be Spoofed or Modified By Remote USers

Source: SECTRACK
Type: UNKNOWN
1024167

Source: CCN
Type: SECTRACK ID: 1024168
Cisco Application Control Engine Newline Processing Flaw May Let Remote Users Modify HTTP Headers

Source: SECTRACK
Type: UNKNOWN
1024168

Source: CCN
Type: Cisco Web site
Cisco

Source: CCN
Type: OSVDB ID: 66092
Cisco Content Services Switch (CSS) / Application Control Engine (ACE) CRLF Sequence Remote Header Insertion Bypass

Source: BUGTRAQ
Type: UNKNOWN
20100702 VSR Advisory: Multiple Cisco CSS / ACE Client Certificate and HTTP Header Manipulation Vulnerabilities

Source: BID
Type: UNKNOWN
41315

Source: CCN
Type: BID-41315
Cisco CSS/ACE Multiple Remote Security Vulnerabilities

Source: CCN
Type: Virtual Security Research, LLC. Security Advisory
Cisco CSS & ACE Certificate Spoofing and Header Manipulation

Source: MISC
Type: Exploit
http://www.vsecurity.com/resources/advisory/20100702-1/

Source: XF
Type: UNKNOWN
css-ace-newline-response-splitting(60081)

Vulnerable Configuration:Configuration 1:
  • cpe:/h:cisco:content_services_switch_11500:8.20.0.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:08.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.2.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:* (Version <= 8.20.3.03)

  • Configuration 2:
  • cpe:/h:cisco:ace_4710:a1(2.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:a1(8.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:*:*:*:*:*:*:*:* (Version <= a3(2.5))

  • Configuration CCN 1:
  • cpe:/h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco content services switch 11500 8.20.0.01
    cisco content services switch 11500 08.20.1.01
    cisco content services switch 11500 8.20.1.01
    cisco content services switch 11500 8.20.2.01
    cisco content services switch 11500 *
    cisco ace 4710 a1(2.0)
    cisco ace 4710 a1(8.0)
    cisco ace 4710 *
    cisco content services switch 11500 *