Lucene search

K
ciscoCiscoCISCO-SA-20150529-CVE-2015-0733
HistoryMay 29, 2015 - 8:09 p.m.

Cisco Headend Digital Broadband Delivery System HTTP Response-Splitting Vulnerability

2015-05-2920:09:48
tools.cisco.com
12

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

45.1%

A vulnerability in the Cisco Headend Digital Broadband Delivery System could allow an unauthenticated, remote attacker to conduct HTTP response-splitting attacks.

The vulnerability is due to improper sanitization on user input performed by the HTTP Header Handler within the affected software while handling HTTP requests. An attacker could exploit this vulnerability by convincing a user to follow a malicious HTTP URL with crafted carriage return-line feed (CRLF) characters. When processed, such characters could allow the attacker to execute arbitrary script code in the browser in the security context of the affected site or to generate crafted responses for the user. This may allow the attacker to conduct further attacks on the targeted system.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.

Affected configurations

Vulners
Node
ciscoheadend_system_releaseMatchany
OR
ciscoheadend_system_releaseMatchany
VendorProductVersionCPE
ciscoheadend_system_releaseanycpe:2.3:o:cisco:headend_system_release:any:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.001

Percentile

45.1%

Related for CISCO-SA-20150529-CVE-2015-0733