ID

VAR-201201-0118


CVE

CVE-2012-0310


TITLE

Cogent DataHub vulnerable to HTTP header injection

Trust: 0.8

sources: JVNDB: JVNDB-2012-000002

DESCRIPTION

CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a HTTP header injection vulnerability (also known as CRLF, carriage return line feed, injection vulnerability). Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a remote attacker sends a crafted HTTP header to a vulnerable system, forged information may be displayed on the user's web browser or an HTTP response splitting attack may be conducted. The following versions are vulnerable: OPC DataHub Cascade DataHub Cogent DataHub. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Cogent DataHub Cross-Site Scripting and HTTP Header Injection Vulnerabilities SECUNIA ADVISORY ID: SA47496 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47496/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47496 RELEASE DATE: 2012-01-11 DISCUSS ADVISORY: http://secunia.com/advisories/47496/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47496/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47496 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 2) Certain unspecified input is not properly sanitised before being used to display HTTP headers. This can be exploited to include arbitrary HTTP headers in a response sent to the user. SOLUTION: Update to version 7.2.0. ORIGINAL ADVISORY: JVN: http://jvn.jp/en/jp/JVN63249231/index.html http://jvn.jp/en/jp/JVN12983784/index.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html Cogent: http://www.cogentdatahub.com/ReleaseNotes.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-0310 // JVNDB: JVNDB-2012-000002 // CNVD: CNVD-2012-0097 // BID: 51375 // VULMON: CVE-2012-0310 // PACKETSTORM: 108568 // PACKETSTORM: 108571

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-0097

AFFECTED PRODUCTS

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1.63

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0.2

Trust: 1.6

vendor:cogentdatahubmodel:opc datahubscope:lteversion:6.4.20

Trust: 1.0

vendor:cogentdatahubmodel:cogent datahubscope:lteversion:7.1.2

Trust: 1.0

vendor:cogentdatahubmodel:cascade datahubscope:lteversion:6.4.20

Trust: 1.0

vendor:cogent real timemodel:cascade datahubscope:lteversion:v6.4.20

Trust: 0.8

vendor:cogent real timemodel:datahubscope:lteversion:v7.1.2

Trust: 0.8

vendor:cogent real timemodel:opc datahubscope:lteversion:v6.4.20

Trust: 0.8

vendor:cogentmodel:real-time systems opc datahubscope:eqversion:6.4.21

Trust: 0.6

vendor:cogentmodel:real-time systems datahubscope:eqversion:7.1.2

Trust: 0.6

vendor:cogentmodel:real-time systems cascade datahubscope:eqversion:6.4.21

Trust: 0.6

vendor:cogentdatahubmodel:opc datahubscope:eqversion:6.4.20

Trust: 0.6

vendor:cogentdatahubmodel:cascade datahubscope:eqversion:6.4.20

Trust: 0.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.2

Trust: 0.6

vendor:cogentmodel:opc datahubscope:eqversion:6.4.21

Trust: 0.3

vendor:cogentmodel:datahubscope:eqversion:7.1.2

Trust: 0.3

vendor:cogentmodel:cascade datahubscope:eqversion:6.4.21

Trust: 0.3

vendor:cogentmodel:opc datahubscope:neversion:7.2

Trust: 0.3

vendor:cogentmodel:datahubscope:neversion:7.2

Trust: 0.3

vendor:cogentmodel:cascade datahubscope:neversion:7.2.0

Trust: 0.3

sources: CNVD: CNVD-2012-0097 // BID: 51375 // JVNDB: JVNDB-2012-000002 // CNNVD: CNNVD-201201-159 // NVD: CVE-2012-0310

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0310
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2012-000002
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201201-159
value: MEDIUM

Trust: 0.6

VULMON: CVE-2012-0310
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0310
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2012-000002
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2012-0310 // JVNDB: JVNDB-2012-000002 // CNNVD: CNNVD-201201-159 // NVD: CVE-2012-0310

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2012-000002 // NVD: CVE-2012-0310

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-159

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201201-159

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-000002

PATCH

title:Release Notesurl:http://www.cogentdatahub.com/ReleaseNotes.html

Trust: 0.8

title:Download Softwareurl:http://www.cogentdatahub.com/Download_Software.html

Trust: 0.8

title:Patches for unclear HTTP header injection vulnerabilities in multiple DataHub productsurl:https://www.cnvd.org.cn/patchInfo/show/7311

Trust: 0.6

sources: CNVD: CNVD-2012-0097 // JVNDB: JVNDB-2012-000002

EXTERNAL IDS

db:JVNDBid:JVNDB-2012-000002

Trust: 3.6

db:NVDid:CVE-2012-0310

Trust: 2.8

db:JVNid:JVN63249231

Trust: 2.7

db:ICS CERTid:ICSA-12-016-01

Trust: 2.2

db:BIDid:51375

Trust: 2.0

db:SECUNIAid:47496

Trust: 1.4

db:SECUNIAid:47525

Trust: 1.4

db:CNVDid:CNVD-2012-0097

Trust: 0.6

db:JVNid:JVN#63249231

Trust: 0.6

db:CNNVDid:CNNVD-201201-159

Trust: 0.6

db:JVNid:JVN12983784

Trust: 0.2

db:JVNDBid:JVNDB-2012-000001

Trust: 0.2

db:VULMONid:CVE-2012-0310

Trust: 0.1

db:PACKETSTORMid:108568

Trust: 0.1

db:PACKETSTORMid:108571

Trust: 0.1

sources: CNVD: CNVD-2012-0097 // VULMON: CVE-2012-0310 // BID: 51375 // JVNDB: JVNDB-2012-000002 // PACKETSTORM: 108568 // PACKETSTORM: 108571 // CNNVD: CNNVD-201201-159 // NVD: CVE-2012-0310

REFERENCES

url:http://jvn.jp/en/jp/jvn63249231/index.html

Trust: 2.7

url:http://www.cogentdatahub.com/releasenotes.html

Trust: 2.2

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-016-01.pdf

Trust: 2.2

url:http://jvndb.jvn.jp/jvndb/jvndb-2012-000002

Trust: 1.7

url:http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000002.html

Trust: 1.1

url:http://secunia.com/advisories/47496

Trust: 1.1

url:http://secunia.com/advisories/47525

Trust: 1.1

url:http://www.securityfocus.com/bid/51375

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72306

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0310

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0310

Trust: 0.8

url:http://www.cogentdatahub.com/products/cogent_datahub.html

Trust: 0.3

url:http://secunia.com/company/jobs/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://jvn.jp/en/jp/jvn12983784/index.html

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000001.html

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/94.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/advisories/47496/

Trust: 0.1

url:http://secunia.com/advisories/47496/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47496

Trust: 0.1

url:http://secunia.com/advisories/47525/

Trust: 0.1

url:http://secunia.com/advisories/47525/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47525

Trust: 0.1

sources: CNVD: CNVD-2012-0097 // VULMON: CVE-2012-0310 // BID: 51375 // JVNDB: JVNDB-2012-000002 // PACKETSTORM: 108568 // PACKETSTORM: 108571 // CNNVD: CNNVD-201201-159 // NVD: CVE-2012-0310

CREDITS

Kuang-Chun Hung of Security Research and Service Institute, ICST

Trust: 0.3

sources: BID: 51375

SOURCES

db:CNVDid:CNVD-2012-0097
db:VULMONid:CVE-2012-0310
db:BIDid:51375
db:JVNDBid:JVNDB-2012-000002
db:PACKETSTORMid:108568
db:PACKETSTORMid:108571
db:CNNVDid:CNNVD-201201-159
db:NVDid:CVE-2012-0310

LAST UPDATE DATE

2025-04-11T23:08:52.313000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-0097date:2012-01-13T00:00:00
db:VULMONid:CVE-2012-0310date:2017-08-29T00:00:00
db:BIDid:51375date:2015-03-19T08:38:00
db:JVNDBid:JVNDB-2012-000002date:2012-01-13T00:00:00
db:CNNVDid:CNNVD-201201-159date:2012-01-16T00:00:00
db:NVDid:CVE-2012-0310date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-0097date:2012-01-13T00:00:00
db:VULMONid:CVE-2012-0310date:2012-01-13T00:00:00
db:BIDid:51375date:2012-01-11T00:00:00
db:JVNDBid:JVNDB-2012-000002date:2012-01-11T00:00:00
db:PACKETSTORMid:108568date:2012-01-11T06:58:06
db:PACKETSTORMid:108571date:2012-01-11T06:58:15
db:CNNVDid:CNNVD-201201-159date:2012-01-16T00:00:00
db:NVDid:CVE-2012-0310date:2012-01-13T04:14:39.037