ID

VAR-201201-0117


CVE

CVE-2012-0309


TITLE

Cogent DataHub/Cascade DataHub/OPC DataHub Cross-Site Scripting Vulnerability

Trust: 1.8

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-9229 // CNNVD: CNNVD-201201-158

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a cross-site scripting vulnerability. Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. A remote attacker can send a specially crafted HTTP header to the affected system, forging information displayed on the user's web browser or performing an HTTP response fragmentation attack. Cogent DataHub is the latest version of DataHub's long-line product, which sets performance ratings for real-time data solutions. By inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. The following versions are vulnerable: OPC DataHub Cascade DataHub Cogent DataHub. ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: Cogent DataHub Cross-Site Scripting and HTTP Header Injection Vulnerabilities SECUNIA ADVISORY ID: SA47496 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47496/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47496 RELEASE DATE: 2012-01-11 DISCUSS ADVISORY: http://secunia.com/advisories/47496/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47496/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47496 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks. 1) Certain unspecified input is not properly sanitised before being returned to the user. 2) Certain unspecified input is not properly sanitised before being used to display HTTP headers. This can be exploited to include arbitrary HTTP headers in a response sent to the user. SOLUTION: Update to version 7.2.0. ORIGINAL ADVISORY: JVN: http://jvn.jp/en/jp/JVN63249231/index.html http://jvn.jp/en/jp/JVN12983784/index.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html Cogent: http://www.cogentdatahub.com/ReleaseNotes.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.87

sources: NVD: CVE-2012-0309 // JVNDB: JVNDB-2012-000001 // CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229 // BID: 51375 // IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d // PACKETSTORM: 108568 // PACKETSTORM: 108571

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 2.0

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229

AFFECTED PRODUCTS

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.1.63

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.0

Trust: 1.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.0.2

Trust: 1.6

vendor:cogentdatahubmodel:cascade datahubscope:lteversion:6.4.20

Trust: 1.0

vendor:cogentdatahubmodel:cogent datahubscope:lteversion:7.1.2

Trust: 1.0

vendor:cogentdatahubmodel:opc datahubscope:lteversion:6.4.20

Trust: 1.0

vendor:cogentmodel:real-time systems cascade datahubscope:eqversion:6.4.21

Trust: 0.8

vendor:cogent real timemodel:cascade datahubscope:lteversion:v6.4.20

Trust: 0.8

vendor:cogent real timemodel:datahubscope:lteversion:v7.1.2

Trust: 0.8

vendor:cogent real timemodel:opc datahubscope:lteversion:v6.4.20

Trust: 0.8

vendor:cascade datahubmodel: - scope:eqversion:*

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.0

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.0.2

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.1.0

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.1.1

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:7.1.1.63

Trust: 0.6

vendor:cogent datahubmodel: - scope:eqversion:*

Trust: 0.6

vendor:opc datahubmodel: - scope:eqversion:*

Trust: 0.6

vendor:cogentmodel:real-time systems opc datahubscope:eqversion:6.4.21

Trust: 0.6

vendor:cogentmodel:real-time systems datahubscope:eqversion:7.1.2

Trust: 0.6

vendor:cogentmodel:real-time systems cogent datahubscope:eqversion:7.1.1.63

Trust: 0.6

vendor:cogentdatahubmodel:opc datahubscope:eqversion:6.4.20

Trust: 0.6

vendor:cogentdatahubmodel:cascade datahubscope:eqversion:6.4.20

Trust: 0.6

vendor:cogentdatahubmodel:cogent datahubscope:eqversion:7.1.2

Trust: 0.6

vendor:cogentmodel:opc datahubscope:eqversion:6.4.21

Trust: 0.3

vendor:cogentmodel:datahubscope:eqversion:7.1.2

Trust: 0.3

vendor:cogentmodel:cascade datahubscope:eqversion:6.4.21

Trust: 0.3

vendor:cogentmodel:opc datahubscope:neversion:7.2

Trust: 0.3

vendor:cogentmodel:datahubscope:neversion:7.2

Trust: 0.3

vendor:cogentmodel:cascade datahubscope:neversion:7.2.0

Trust: 0.3

vendor:cogentmodel:real-time systems opc datahubscope:eqversion:6.4.21*

Trust: 0.2

vendor:cogentmodel:real-time systems datahubscope:eqversion:7.1.2*

Trust: 0.2

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229 // BID: 51375 // JVNDB: JVNDB-2012-000001 // CNNVD: CNNVD-201201-158 // NVD: CVE-2012-0309

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0309
value: MEDIUM

Trust: 1.0

IPA: JVNDB-2012-000001
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2012-9229
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201201-158
value: MEDIUM

Trust: 0.6

IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1
value: MEDIUM

Trust: 0.2

IVD: 39e451cc-2354-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: 3a530108-2354-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2012-0309
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2012-000001
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2012-9229
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 39e451cc-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 3a530108-2354-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-9229 // JVNDB: JVNDB-2012-000001 // CNNVD: CNNVD-201201-158 // NVD: CVE-2012-0309

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.8

sources: JVNDB: JVNDB-2012-000001 // NVD: CVE-2012-0309

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-158

TYPE

Cross-site scripting

Trust: 0.8

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-000001

PATCH

title:Release Notesurl:http://www.cogentdatahub.com/ReleaseNotes.html

Trust: 0.8

title:Download Softwareurl:http://www.cogentdatahub.com/Download_Software.html

Trust: 0.8

title:Patches for unclear HTTP header injection vulnerabilities in multiple DataHub productsurl:https://www.cnvd.org.cn/patchInfo/show/7311

Trust: 0.6

title:Patch for Cogent DataHub/Cascade DataHub/OPC DataHub Cross-Site Scripting Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/26872

Trust: 0.6

sources: CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229 // JVNDB: JVNDB-2012-000001

EXTERNAL IDS

db:NVDid:CVE-2012-0309

Trust: 4.1

db:JVNid:JVN12983784

Trust: 2.6

db:JVNDBid:JVNDB-2012-000001

Trust: 2.6

db:BIDid:51375

Trust: 2.5

db:ICS CERTid:ICSA-12-016-01

Trust: 2.1

db:CNNVDid:CNNVD-201201-158

Trust: 1.4

db:SECUNIAid:47496

Trust: 1.3

db:SECUNIAid:47525

Trust: 1.3

db:CNVDid:CNVD-2012-9229

Trust: 1.2

db:JVNDBid:JVNDB-2012-000002

Trust: 1.1

db:CNVDid:CNVD-2012-0097

Trust: 0.8

db:JVNid:JVN#12983784

Trust: 0.6

db:IVDid:7D79A982-463F-11E9-AD0C-000C29342CB1

Trust: 0.2

db:IVDid:39E451CC-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:3A530108-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:BEDA6B8A-1F78-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:JVNid:JVN63249231

Trust: 0.2

db:PACKETSTORMid:108568

Trust: 0.1

db:PACKETSTORMid:108571

Trust: 0.1

sources: IVD: 7d79a982-463f-11e9-ad0c-000c29342cb1 // IVD: 39e451cc-2354-11e6-abef-000c29c66e3d // IVD: 3a530108-2354-11e6-abef-000c29c66e3d // IVD: beda6b8a-1f78-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229 // BID: 51375 // JVNDB: JVNDB-2012-000001 // PACKETSTORM: 108568 // PACKETSTORM: 108571 // CNNVD: CNNVD-201201-158 // NVD: CVE-2012-0309

REFERENCES

url:http://jvn.jp/en/jp/jvn12983784/index.html

Trust: 2.6

url:http://www.us-cert.gov/control_systems/pdf/icsa-12-016-01.pdf

Trust: 2.1

url:http://www.cogentdatahub.com/releasenotes.html

Trust: 2.1

url:http://www.securityfocus.com/bid/51375

Trust: 1.6

url:http://jvndb.jvn.jp/jvndb/jvndb-2012-000001

Trust: 1.6

url:http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000002.html

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72305

Trust: 1.0

url:http://secunia.com/advisories/47525

Trust: 1.0

url:http://secunia.com/advisories/47496

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0309

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0309

Trust: 0.8

url:http://www.cogentdatahub.com/products/cogent_datahub.html

Trust: 0.3

url:http://jvn.jp/en/jp/jvn63249231/index.html

Trust: 0.2

url:http://secunia.com/company/jobs/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000001.html

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/47496/

Trust: 0.1

url:http://secunia.com/advisories/47496/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47496

Trust: 0.1

url:http://secunia.com/advisories/47525/

Trust: 0.1

url:http://secunia.com/advisories/47525/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47525

Trust: 0.1

sources: CNVD: CNVD-2012-0097 // CNVD: CNVD-2012-9229 // BID: 51375 // JVNDB: JVNDB-2012-000001 // PACKETSTORM: 108568 // PACKETSTORM: 108571 // CNNVD: CNNVD-201201-158 // NVD: CVE-2012-0309

CREDITS

Kuang-Chun Hung of Security Research and Service Institute, ICST

Trust: 0.3

sources: BID: 51375

SOURCES

db:IVDid:7d79a982-463f-11e9-ad0c-000c29342cb1
db:IVDid:39e451cc-2354-11e6-abef-000c29c66e3d
db:IVDid:3a530108-2354-11e6-abef-000c29c66e3d
db:IVDid:beda6b8a-1f78-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-0097
db:CNVDid:CNVD-2012-9229
db:BIDid:51375
db:JVNDBid:JVNDB-2012-000001
db:PACKETSTORMid:108568
db:PACKETSTORMid:108571
db:CNNVDid:CNNVD-201201-158
db:NVDid:CVE-2012-0309

LAST UPDATE DATE

2024-11-23T22:02:44.100000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-0097date:2012-01-13T00:00:00
db:CNVDid:CNVD-2012-9229date:2012-01-16T00:00:00
db:BIDid:51375date:2015-03-19T08:38:00
db:JVNDBid:JVNDB-2012-000001date:2012-01-13T00:00:00
db:CNNVDid:CNNVD-201201-158date:2012-01-16T00:00:00
db:NVDid:CVE-2012-0309date:2024-11-21T01:34:46.393

SOURCES RELEASE DATE

db:IVDid:7d79a982-463f-11e9-ad0c-000c29342cb1date:2012-01-16T00:00:00
db:IVDid:39e451cc-2354-11e6-abef-000c29c66e3ddate:2012-01-16T00:00:00
db:IVDid:3a530108-2354-11e6-abef-000c29c66e3ddate:2012-01-16T00:00:00
db:IVDid:beda6b8a-1f78-11e6-abef-000c29c66e3ddate:2012-01-13T00:00:00
db:CNVDid:CNVD-2012-0097date:2012-01-13T00:00:00
db:CNVDid:CNVD-2012-9229date:2012-01-16T00:00:00
db:BIDid:51375date:2012-01-11T00:00:00
db:JVNDBid:JVNDB-2012-000001date:2012-01-11T00:00:00
db:PACKETSTORMid:108568date:2012-01-11T06:58:06
db:PACKETSTORMid:108571date:2012-01-11T06:58:15
db:CNNVDid:CNNVD-201201-158date:2012-01-16T00:00:00
db:NVDid:CVE-2012-0309date:2012-01-13T04:14:38.987