CRLF injection vulnerability in the HTTP Header Handler in Digital Broadband Delivery System in Cisco Headend System Release allows remote attackers to inject arbitrary HTTP headers, and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks, via a crafted request, aka Bug ID CSCur25580.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/viewAlert.x?alertId=38863 | Vendor Advisory |
http://www.securitytracker.com/id/1032445 | Third Party Advisory VDB Entry |
http://tools.cisco.com/security/center/viewAlert.x?alertId=38863 | Vendor Advisory |
http://www.securitytracker.com/id/1032445 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 02:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/viewAlert.x?alertId=38863 - Vendor Advisory | |
References | () http://www.securitytracker.com/id/1032445 - Third Party Advisory, VDB Entry |
Information
Published : 2015-05-30 14:59
Updated : 2024-11-21 02:23
NVD link : CVE-2015-0733
Mitre link : CVE-2015-0733
CVE.ORG link : CVE-2015-0733
JSON object : View
Products Affected
cisco
- headend_digital_broadband_delivery_system
CWE
CWE-113
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')