Vulnerability Name: | CVE-2010-1576 (CCN-60081) | ||||||||
Assigned: | 2010-07-02 | ||||||||
Published: | 2010-07-02 | ||||||||
Updated: | 2018-10-10 | ||||||||
Summary: | The Cisco Content Services Switch (CSS) 11500 with software before 8.20.4.02 and the Application Control Engine (ACE) 4710 with software before A2(3.0) do not properly handle use of LF, CR, and LFCR as alternatives to the standard CRLF sequence between HTTP headers, which allows remote attackers to bypass intended header insertions or conduct HTTP request smuggling attacks via crafted header data, as demonstrated by LF characters preceding ClientCert-Subject and ClientCert-Subject-CN headers, aka Bug ID CSCta04885. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.1 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:U/RC:UR)
4.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:UR)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-1576 Source: OSVDB Type: UNKNOWN 66092 Source: CCN Type: SECTRACK ID: 1024167 Cisco Content Services Switch HTTP and ClientCert Headers Can Be Spoofed or Modified By Remote USers Source: SECTRACK Type: UNKNOWN 1024167 Source: CCN Type: SECTRACK ID: 1024168 Cisco Application Control Engine Newline Processing Flaw May Let Remote Users Modify HTTP Headers Source: SECTRACK Type: UNKNOWN 1024168 Source: CCN Type: Cisco Web site Cisco Source: CCN Type: OSVDB ID: 66092 Cisco Content Services Switch (CSS) / Application Control Engine (ACE) CRLF Sequence Remote Header Insertion Bypass Source: BUGTRAQ Type: UNKNOWN 20100702 VSR Advisory: Multiple Cisco CSS / ACE Client Certificate and HTTP Header Manipulation Vulnerabilities Source: BID Type: UNKNOWN 41315 Source: CCN Type: BID-41315 Cisco CSS/ACE Multiple Remote Security Vulnerabilities Source: CCN Type: Virtual Security Research, LLC. Security Advisory Cisco CSS & ACE Certificate Spoofing and Header Manipulation Source: MISC Type: Exploit http://www.vsecurity.com/resources/advisory/20100702-1/ Source: XF Type: UNKNOWN css-ace-newline-response-splitting(60081) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||
BACK |