Advisory

Cisco ASA HTTP Response Splitting Vulnerability

Advisory ID: SWRX-2010-001

Advisory Information
  • Title: Cisco ASA HTTP Response Splitting Vulnerability
  • Advisory ID: SWRX-2010-001
  • Date published: Thursday, June 24, 2010
  • CVE: CVE-2008-7257
  • CVSS v2 Base Score: 5 (Medium) (AV:N/AC:L/Au:N/C:N/I:P/A:N)
  • Date of last update: Thursday, June 24, 2010
  • Vendors contacted: Cisco Systems, Inc.
  • Release mode: Coordinated release
  • Discovered by: Daniel King, SecureWorks

Summary
Cisco Adaptive Security Appliance (ASA) is vulnerable to HTTP response splitting caused by improper validation of user–supplied input. A remote attacker could exploit this vulnerability using a specially–crafted URL to execute script in a victim's web browser within the security context of the Adaptive Security Appliance site.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As")

SecureWorks CTU Public Key



ABOUT THE AUTHOR
COUNTER THREAT UNIT RESEARCH TEAM

Secureworks Counter Threat Unit™ (CTU) researchers frequently serve as expert resources for the media, publish technical analyses for the security community, and speak about emerging threats at security conferences. Leveraging Secureworks’ advanced security technologies and a network of industry contacts, the CTU™ research team tracks threat actors and analyzes anomalous activity, uncovering new attack techniques and threats. This process enables CTU researchers to identify threats as they emerge and develop countermeasures that protect customers before damage can occur.
Revenir aux blogs

Essayer Taegis dès aujourd’hui

Voyez par vous-même : demandez votre démo pour voir comment Taegis peut réduire les risques, optimiser les investissements de sécurité existants et pallier la pénurie de talents.