Vulnerability Name:

CVE-2010-2629 (CCN-60187)

Assigned:2010-07-02
Published:2010-07-02
Updated:2018-10-10
Summary:The Cisco Content Services Switch (CSS) 11500 with software 8.20.4.02 and the Application Control Engine (ACE) 4710 with software A2(3.0) do not properly handle LF header terminators in situations where the GET line is terminated by CRLF, which allows remote attackers to conduct HTTP request smuggling attacks and possibly bypass intended header insertions via crafted header data, as demonstrated by an LF character between the ClientCert-Subject and ClientCert-Subject-CN headers.
Note: this vulnerability exists because of an incomplete fix for CVE-2010-1576.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-2629

Source: CCN
Type: SECTRACK ID: 1024167
Cisco Content Services Switch HTTP and ClientCert Headers Can Be Spoofed or Modified By Remote USers

Source: SECTRACK
Type: UNKNOWN
1024167

Source: CCN
Type: SECTRACK ID: 1024168
Cisco Application Control Engine Newline Processing Flaw May Let Remote Users Modify HTTP Headers

Source: SECTRACK
Type: UNKNOWN
1024168

Source: CCN
Type: Cisco Web site
Cisco

Source: BUGTRAQ
Type: UNKNOWN
20100702 VSR Advisory: Multiple Cisco CSS / ACE Client Certificate and HTTP Header Manipulation Vulnerabilities

Source: BID
Type: UNKNOWN
41315

Source: CCN
Type: BID-41315
Cisco CSS/ACE Multiple Remote Security Vulnerabilities

Source: CCN
Type: Virtual Security Research, LLC. Security Advisory
Cisco CSS & ACE Certificate Spoofing and Header Manipulation

Source: MISC
Type: UNKNOWN
http://www.vsecurity.com/resources/advisory/20100702-1/

Source: XF
Type: UNKNOWN
css-header-data-sec-bypass(60187)

Vulnerable Configuration:Configuration 1:
  • cpe:/h:cisco:content_services_switch_11500:8.20.0.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:08.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.2.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:*:*:*:*:*:*:*:* (Version <= 8.20.3.03)

  • Configuration 2:
  • cpe:/h:cisco:ace_4710:a1(2.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:a1(8.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:*:*:*:*:*:*:*:* (Version <= a3(2.5))

  • Configuration CCN 1:
  • cpe:/h:cisco:ace_4710:a1(2.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:a1(8.0):*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.3.03:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.2.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:8.20.0.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:content_services_switch_11500:08.20.1.01:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:ace_4710:a3(2.5):*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco content services switch 11500 8.20.0.01
    cisco content services switch 11500 08.20.1.01
    cisco content services switch 11500 8.20.1.01
    cisco content services switch 11500 8.20.2.01
    cisco content services switch 11500 *
    cisco ace 4710 a1(2.0)
    cisco ace 4710 a1(8.0)
    cisco ace 4710 *
    cisco ace 4710 a1(2.0)
    cisco ace 4710 a1(8.0)
    cisco content services switch 11500 8.20.3.03
    cisco content services switch 11500 8.20.2.01
    cisco content services switch 11500 8.20.1.01
    cisco content services switch 11500 8.20.0.01
    cisco content services switch 11500 08.20.1.01
    cisco ace 4710 a3(2.5)