Vulnerabilites related to Cogent - DataHub
var-201310-0636
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent DataHub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of POST requests. By sending a malformed POST, an attacker is able to overflow a heap buffer. An attacker could exploit this vulnerability to execute arbitrary code in the context of the DataHub process. Cogent Real-Time Systems Cogent DataHub is a set of real-time data solutions from Canada's Cogent Real-Time Systems. It belongs to SCADA (Data Acquisition and Monitoring Control System) and automation software. A denial of service vulnerability exists in versions of Cogent DataHub prior to 7.3.4. An attacker could use this vulnerability to crash the server and deny legitimate users. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0636", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "datahub", "scope": null, "trust": 0.7, "vendor": "cogent real time", "version": null }, { "model": "real-time systems cogent datahub", "scope": "lt", "trust": 0.6, "vendor": "cogent", "version": "7.3.4" }, { "model": "real-time systems", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" }, { "model": "datahub", "scope": "lt", "trust": 0.2, "vendor": "cogent", "version": "7.3.4" } ], "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pawel Wylecial", "sources": [ { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "BID", "id": "63397" }, { "db": "CNNVD", "id": "CNNVD-201310-689" } ], "trust": 1.6 }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "ZDI-13-252", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2013-14172", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "b973b25a-1f00-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "ZDI-13-252", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-14172", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent DataHub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of POST requests. By sending a malformed POST, an attacker is able to overflow a heap buffer. An attacker could exploit this vulnerability to execute arbitrary code in the context of the DataHub process. Cogent Real-Time Systems Cogent DataHub is a set of real-time data solutions from Canada\u0027s Cogent Real-Time Systems. It belongs to SCADA (Data Acquisition and Monitoring Control System) and automation software. \nA denial of service vulnerability exists in versions of Cogent DataHub prior to 7.3.4. An attacker could use this vulnerability to crash the server and deny legitimate users. Failed exploit attempts will likely result in denial-of-service conditions", "sources": [ { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" }, { "db": "CNNVD", "id": "CNNVD-201310-689" }, { "db": "BID", "id": "63397" }, { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "63397", "trust": 1.5 }, { "db": "ZDI", "id": "ZDI-13-252", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2013-14172", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1981", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201310-689", "trust": 0.6 }, { "db": "IVD", "id": "B973B25A-1F00-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" }, { "db": "BID", "id": "63397" }, { "db": "CNNVD", "id": "CNNVD-201310-689" } ] }, "id": "VAR-201310-0636", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-14172" } ], "trust": 1.5661290300000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-14172" } ] }, "last_update_date": "2022-05-17T02:04:40.400000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Cogent Real-Time Systems has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://www.cogentdatahub.com/download_software.html" }, { "title": "Cogent DataHub denial of service vulnerability patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/40621" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "http://www.securityfocus.com/bid/63397" }, { "trust": 0.7, "url": "http://www.cogentdatahub.com/download_software.html" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-13-252/" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/index.html" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/releasenotes.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" }, { "db": "BID", "id": "63397" }, { "db": "CNNVD", "id": "CNNVD-201310-689" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-252" }, { "db": "CNVD", "id": "CNVD-2013-14172" }, { "db": "BID", "id": "63397" }, { "db": "CNNVD", "id": "CNNVD-201310-689" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-31T00:00:00", "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "date": "2013-11-24T00:00:00", "db": "ZDI", "id": "ZDI-13-252" }, { "date": "2013-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-14172" }, { "date": "2013-10-29T00:00:00", "db": "BID", "id": "63397" }, { "date": "2013-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-689" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-11-24T00:00:00", "db": "ZDI", "id": "ZDI-13-252" }, { "date": "2013-10-31T00:00:00", "db": "CNVD", "id": "CNVD-2013-14172" }, { "date": "2015-03-19T09:30:00", "db": "BID", "id": "63397" }, { "date": "2013-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201310-689" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201310-689" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub Denial of service vulnerability", "sources": [ { "db": "IVD", "id": "b973b25a-1f00-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-14172" }, { "db": "CNNVD", "id": "CNNVD-201310-689" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "63397" } ], "trust": 0.3 } }
var-201109-0172
Vulnerability from variot
Directory traversal vulnerability in the web server in Cogent DataHub 7.1.1.63 and earlier allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in an HTTP request. Cogent DataHub is software for SCADA and automation. The Cogent DataHub server/service uses a custom web server that listens on port 80. The software does not handle the directory traversal sequence correctly. An attacker can exploit the vulnerability to download files on the server. Cogent DataHub is prone to a directory-traversal vulnerability and an information-disclosure vulnerability because the application fails to sufficiently sanitize user-supplied input. Exploiting the issues may allow an attacker to obtain sensitive information that could aid in further attacks. Cogent DataHub 7.1.1.63 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201109-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 1.5, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "real-time systems", "scope": "eq", "trust": 0.8, "vendor": "cogent", "version": "*" }, { "model": "datahub", "scope": "eq", "trust": 0.8, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "7.1.1.63" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.0.2" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6" }, { "model": "real-time systems opc datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" }, { "model": "real-time systems cogent datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": "real-time systems cascade datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" } ], "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" }, { "db": "BID", "id": "49610" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNNVD", "id": "CNNVD-201109-273" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002277" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "49610" }, { "db": "CNNVD", "id": "CNNVD-201109-184" } ], "trust": 0.9 }, "cve": "CVE-2011-3500", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2011-3500", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "845b627e-1f88-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "861a1a24-1f88-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3500", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-3500", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201109-273", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2011-3500", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "VULMON", "id": "CVE-2011-3500" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNNVD", "id": "CNNVD-201109-273" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the web server in Cogent DataHub 7.1.1.63 and earlier allows remote attackers to read arbitrary files via a ..\\ (dot dot backslash) in an HTTP request. Cogent DataHub is software for SCADA and automation. The Cogent DataHub server/service uses a custom web server that listens on port 80. The software does not handle the directory traversal sequence correctly. An attacker can exploit the vulnerability to download files on the server. Cogent DataHub is prone to a directory-traversal vulnerability and an information-disclosure vulnerability because the application fails to sufficiently sanitize user-supplied input. \nExploiting the issues may allow an attacker to obtain sensitive information that could aid in further attacks. \nCogent DataHub 7.1.1.63 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2011-3500" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" }, { "db": "BID", "id": "49610" }, { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "VULMON", "id": "CVE-2011-3500" } ], "trust": 3.78 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3500", "trust": 3.6 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-256-03", "trust": 2.5 }, { "db": "BID", "id": "49610", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201109-273", "trust": 1.4 }, { "db": "ICS CERT", "id": "ICSA-11-280-01", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2011-3672", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2011-3671", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-002277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201109-184", "trust": 0.6 }, { "db": "IVD", "id": "845B627E-1F88-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "A4D2ED7C-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "A4B8C2C6-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "861A1A24-1F88-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2011-3500", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" }, { "db": "VULMON", "id": "CVE-2011-3500" }, { "db": "BID", "id": "49610" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNNVD", "id": "CNNVD-201109-184" }, { "db": "CNNVD", "id": "CNNVD-201109-273" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "id": "VAR-201109-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" } ], "trust": 2.7203340799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.0 } ], "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" } ] }, "last_update_date": "2024-11-23T22:08:58.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.cogentdatahub.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.cogentdatahub.com/jp/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-03.pdf" }, { "trust": 2.3, "url": "http://aluigi.altervista.org/adv/cogent_2-adv.txt" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-280-01.pdf" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3500" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3500" }, { "trust": 0.6, "url": "http://aluigi.altervista.org/adv/cogent_4-adv.txt" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/49610" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" }, { "trust": 0.3, "url": "http://aluigi.org/mytoolz/mydown.zip" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" }, { "db": "VULMON", "id": "CVE-2011-3500" }, { "db": "BID", "id": "49610" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNNVD", "id": "CNNVD-201109-184" }, { "db": "CNNVD", "id": "CNNVD-201109-273" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNVD", "id": "CNVD-2011-3672" }, { "db": "VULMON", "id": "CVE-2011-3500" }, { "db": "BID", "id": "49610" }, { "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "db": "CNNVD", "id": "CNNVD-201109-184" }, { "db": "CNNVD", "id": "CNNVD-201109-273" }, { "db": "NVD", "id": "CVE-2011-3500" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3671" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3672" }, { "date": "2011-09-16T00:00:00", "db": "VULMON", "id": "CVE-2011-3500" }, { "date": "2011-09-13T00:00:00", "db": "BID", "id": "49610" }, { "date": "2011-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-184" }, { "date": "2011-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-273" }, { "date": "2011-09-16T17:26:14.870000", "db": "NVD", "id": "CVE-2011-3500" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3671" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3672" }, { "date": "2011-09-19T00:00:00", "db": "VULMON", "id": "CVE-2011-3500" }, { "date": "2011-10-11T16:20:00", "db": "BID", "id": "49610" }, { "date": "2012-02-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002277" }, { "date": "2011-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-184" }, { "date": "2011-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-273" }, { "date": "2024-11-21T01:30:36.593000", "db": "NVD", "id": "CVE-2011-3500" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201109-184" }, { "db": "CNNVD", "id": "CNNVD-201109-273" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub Directory Traversal Vulnerability", "sources": [ { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3671" }, { "db": "CNNVD", "id": "CNNVD-201109-273" } ], "trust": 1.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "845b627e-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4d2ed7c-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a4b8c2c6-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "861a1a24-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201109-184" }, { "db": "CNNVD", "id": "CNNVD-201109-273" } ], "trust": 2.0 } }
var-201201-0117
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a cross-site scripting vulnerability. Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user's web browser. A remote attacker can send a specially crafted HTTP header to the affected system, forging information displayed on the user's web browser or performing an HTTP response fragmentation attack. Cogent DataHub is the latest version of DataHub's long-line product, which sets performance ratings for real-time data solutions. By inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. The following versions are vulnerable: OPC DataHub Cascade DataHub Cogent DataHub. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
TITLE: Cogent DataHub Cross-Site Scripting and HTTP Header Injection Vulnerabilities
SECUNIA ADVISORY ID: SA47496
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47496/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
RELEASE DATE: 2012-01-11
DISCUSS ADVISORY: http://secunia.com/advisories/47496/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/47496/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.
1) Certain unspecified input is not properly sanitised before being returned to the user.
2) Certain unspecified input is not properly sanitised before being used to display HTTP headers. This can be exploited to include arbitrary HTTP headers in a response sent to the user.
SOLUTION: Update to version 7.2.0.
ORIGINAL ADVISORY: JVN: http://jvn.jp/en/jp/JVN63249231/index.html http://jvn.jp/en/jp/JVN12983784/index.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html
Cogent: http://www.cogentdatahub.com/ReleaseNotes.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0117", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "cascade datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "opc datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.8, "vendor": "cogent", "version": "6.4.21" }, { "model": "cascade datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v6.4.20" }, { "model": "datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v7.1.2" }, { "model": "opc datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v6.4.20" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cascade datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "7.0" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "7.0.2" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "7.1.0" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "7.1.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "7.1.1.63" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "cogent datahub", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "opc datahub", "version": "*" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.1.2" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.21" }, { "model": "datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.21" }, { "model": "opc datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2" }, { "model": "datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2" }, { "model": "cascade datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2.0" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "6.4.21*" }, { "model": "real-time systems datahub", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "7.1.2*" } ], "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "CNNVD", "id": "CNNVD-201201-158" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cascade_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:opc_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000001" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kuang-Chun Hung of Security Research and Service Institute, ICST", "sources": [ { "db": "BID", "id": "51375" } ], "trust": 0.3 }, "cve": "CVE-2012-0309", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-0309", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2012-000001", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2012-9229", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "7d79a982-463f-11e9-ad0c-000c29342cb1", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "39e451cc-2354-11e6-abef-000c29c66e3d", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "3a530108-2354-11e6-abef-000c29c66e3d", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.9 [IVD]" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0309", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2012-000001", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2012-9229", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201201-158", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" }, { "author": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "CNNVD", "id": "CNNVD-201201-158" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a cross-site scripting vulnerability. Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.An arbitrary script may be executed on the user\u0027s web browser. A remote attacker can send a specially crafted HTTP header to the affected system, forging information displayed on the user\u0027s web browser or performing an HTTP response fragmentation attack. Cogent DataHub is the latest version of DataHub\u0027s long-line product, which sets performance ratings for real-time data solutions. \nBy inserting arbitrary headers into an HTTP response, attackers may be able to launch various attacks, including cross-site request forgery, cross-site scripting, and HTTP-request smuggling. \nThe following versions are vulnerable:\nOPC DataHub\nCascade DataHub\nCogent DataHub. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nCogent DataHub Cross-Site Scripting and HTTP Header Injection\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA47496\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47496/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496\n\nRELEASE DATE:\n2012-01-11\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47496/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47496/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Cogent DataHub, which can\nbe exploited by malicious people to conduct cross-site scripting\nattacks and HTTP response splitting attacks. \n\n1) Certain unspecified input is not properly sanitised before being\nreturned to the user. \n\n2) Certain unspecified input is not properly sanitised before being\nused to display HTTP headers. This can be exploited to include\narbitrary HTTP headers in a response sent to the user. \n\nSOLUTION:\nUpdate to version 7.2.0. \n\nORIGINAL ADVISORY:\nJVN:\nhttp://jvn.jp/en/jp/JVN63249231/index.html\nhttp://jvn.jp/en/jp/JVN12983784/index.html\nhttp://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html\nhttp://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html\n\nCogent:\nhttp://www.cogentdatahub.com/ReleaseNotes.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0309" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "BID", "id": "51375" }, { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" } ], "trust": 3.87 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0309", "trust": 4.1 }, { "db": "JVN", "id": "JVN12983784", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2012-000001", "trust": 2.6 }, { "db": "BID", "id": "51375", "trust": 2.5 }, { "db": "ICS CERT", "id": "ICSA-12-016-01", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201201-158", "trust": 1.4 }, { "db": "SECUNIA", "id": "47496", "trust": 1.3 }, { "db": "SECUNIA", "id": "47525", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2012-9229", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2012-000002", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2012-0097", "trust": 0.8 }, { "db": "JVN", "id": "JVN#12983784", "trust": 0.6 }, { "db": "IVD", "id": "7D79A982-463F-11E9-AD0C-000C29342CB1", "trust": 0.2 }, { "db": "IVD", "id": "39E451CC-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "3A530108-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "BEDA6B8A-1F78-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "JVN", "id": "JVN63249231", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "108568", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108571", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-158" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "id": "VAR-201201-0117", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" } ], "trust": 2.7203340799999998 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 2.0 } ], "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" } ] }, "last_update_date": "2024-11-23T22:02:44.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Release Notes", "trust": 0.8, "url": "http://www.cogentdatahub.com/ReleaseNotes.html" }, { "title": "Download Software", "trust": 0.8, "url": "http://www.cogentdatahub.com/Download_Software.html" }, { "title": "Patches for unclear HTTP header injection vulnerabilities in multiple DataHub products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/7311" }, { "title": "Patch for Cogent DataHub/Cascade DataHub/OPC DataHub Cross-Site Scripting Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/26872" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://jvn.jp/en/jp/jvn12983784/index.html" }, { "trust": 2.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-016-01.pdf" }, { "trust": 2.1, "url": "http://www.cogentdatahub.com/releasenotes.html" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/51375" }, { "trust": 1.6, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000001" }, { "trust": 1.1, "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000002.html" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72305" }, { "trust": 1.0, "url": "http://secunia.com/advisories/47525" }, { "trust": 1.0, "url": "http://secunia.com/advisories/47496" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0309" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0309" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" }, { "trust": 0.2, "url": "http://jvn.jp/en/jp/jvn63249231/index.html" }, { "trust": 0.2, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000001.html" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47496/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47496/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47525/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47525/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47525" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-158" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-158" }, { "db": "NVD", "id": "CVE-2012-0309" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-16T00:00:00", "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "date": "2012-01-16T00:00:00", "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "date": "2012-01-16T00:00:00", "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "date": "2012-01-13T00:00:00", "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" }, { "date": "2012-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2012-0097" }, { "date": "2012-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-9229" }, { "date": "2012-01-11T00:00:00", "db": "BID", "id": "51375" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "date": "2012-01-11T06:58:06", "db": "PACKETSTORM", "id": "108568" }, { "date": "2012-01-11T06:58:15", "db": "PACKETSTORM", "id": "108571" }, { "date": "2012-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-158" }, { "date": "2012-01-13T04:14:38.987000", "db": "NVD", "id": "CVE-2012-0309" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2012-0097" }, { "date": "2012-01-16T00:00:00", "db": "CNVD", "id": "CNVD-2012-9229" }, { "date": "2015-03-19T08:38:00", "db": "BID", "id": "51375" }, { "date": "2012-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000001" }, { "date": "2012-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-158" }, { "date": "2024-11-21T01:34:46.393000", "db": "NVD", "id": "CVE-2012-0309" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-158" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub/Cascade DataHub/OPC DataHub Cross-Site Scripting Vulnerability", "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2012-9229" }, { "db": "CNNVD", "id": "CNNVD-201201-158" } ], "trust": 1.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting", "sources": [ { "db": "IVD", "id": "7d79a982-463f-11e9-ad0c-000c29342cb1" }, { "db": "IVD", "id": "39e451cc-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "3a530108-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "beda6b8a-1f78-11e6-abef-000c29c66e3d" } ], "trust": 0.8 } }
var-201307-0565
Vulnerability from variot
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent Datahub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web server component's handling of HTTP headers. By sending an overlarge HTTP header, an attacker can overflow a fixed size stack buffer. This vulnerability allows for an attacker to execute arbitrary code in the context of the Datahub process. Cogent Real-Time Systems DataHub is a set of real-time data system integration suite based on B / S architecture by Cogent Real-Time Systems of Canada. The kit includes tools such as DataHub WebView and DataHub QuickTrend. Cogent Real-Time Systems DataHub 7.3.0 vulnerabilities exist, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service conditions
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "datahub", "scope": null, "trust": 0.7, "vendor": "cogent real time", "version": null }, { "_id": null, "model": "real-time systems cogent datahub", "scope": null, "trust": 0.6, "vendor": "cogent", "version": null }, { "_id": null, "model": "real-time systems", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" }, { "_id": null, "model": "datahub", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "credits": { "_id": null, "data": "Andrea Micalizzi aka rgod", "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 1.6 }, "cvss": { "_id": null, "data": [ { "cvssV2": [ { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "ZDI-13-178", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2013-11044", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "ZDI", "id": "ZDI-13-178", "trust": 0.7, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2013-11044", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "description": { "_id": null, "data": "This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cogent Datahub. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web server component\u0027s handling of HTTP headers. By sending an overlarge HTTP header, an attacker can overflow a fixed size stack buffer. This vulnerability allows for an attacker to execute arbitrary code in the context of the Datahub process. Cogent Real-Time Systems DataHub is a set of real-time data system integration suite based on B / S architecture by Cogent Real-Time Systems of Canada. The kit includes tools such as DataHub WebView and DataHub QuickTrend. Cogent Real-Time Systems DataHub 7.3.0 vulnerabilities exist, other versions may also be affected. Failed exploit attempts will likely result in denial-of-service conditions", "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "CNNVD", "id": "CNNVD-201307-645" }, { "db": "BID", "id": "61470" }, { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" } ], "trust": 2.16 }, "external_ids": { "_id": null, "data": [ { "db": "BID", "id": "61470", "trust": 1.5 }, { "db": "ZDI", "id": "ZDI-13-178", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2013-11044", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-1915", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201307-645", "trust": 0.6 }, { "db": "IVD", "id": "5D896002-1F14-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ] }, "id": "VAR-201307-0565", "iot": { "_id": null, "data": true, "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ], "trust": 1.5661290300000001 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "last_update_date": "2022-05-17T01:48:04.631000Z", "patch": { "_id": null, "data": [ { "title": "Cogent Real-Time Systems has issued an update to correct this vulnerability.", "trust": 0.7, "url": "http://www.cogentdatahub.com/info/130712_zdi-can-1915_response.html" }, { "title": "Patch for Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/36556" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" } ] }, "references": { "_id": null, "data": [ { "trust": 0.7, "url": "http://www.cogentdatahub.com/info/130712_zdi-can-1915_response.html" }, { "trust": 0.6, "url": "http://www.zerodayinitiative.com/advisories/zdi-13-178/" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/61470" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" } ], "sources": [ { "db": "ZDI", "id": "ZDI-13-178" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ] }, "sources": { "_id": null, "data": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "ident": null }, { "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "db": "BID", "id": "61470", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2013-08-01T00:00:00", "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "BID", "id": "61470", "ident": null }, { "date": "2013-07-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2013-07-26T00:00:00", "db": "ZDI", "id": "ZDI-13-178", "ident": null }, { "date": "2013-08-01T00:00:00", "db": "CNVD", "id": "CNVD-2013-11044", "ident": null }, { "date": "2013-08-19T11:27:00", "db": "BID", "id": "61470", "ident": null }, { "date": "2013-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201307-645", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Cogent Real-Time Systems DataHub Remote Stack Buffer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2013-11044" }, { "db": "BID", "id": "61470" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 1.7 }, "type": { "_id": null, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "5d896002-1f14-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201307-645" } ], "trust": 0.8 } }
var-201109-0186
Vulnerability from variot
Multiple stack-based buffer overflows in the DH_OneSecondTick function in Cogent DataHub 7.1.1.63 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) domain, (2) report_domain, (3) register_datahub, or (4) slave commands. The software incorrectly handles the Content-Length field (-1 or 4294967295) plus one, which can cause integer overflow. Cogent DataHub is software for SCADA and automation. Cogent DataHub has server/service listening ports 4052 and 4053, except that the second port uses SSL, the first one uses plaintext. Cogent DataHub is prone to multiple buffer-overflow and integer-overflow vulnerabilities. Successfully exploiting these issues may allow attackers to execute arbitrary code within the context of the privileged domain (Dom0). Failed attempts will likely cause denial-of-service conditions. Cogent DataHub 7.1.1.63 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201109-0186", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 1.5, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "real-time systems", "scope": "eq", "trust": 0.4, "vendor": "cogent", "version": "*" }, { "model": "datahub", "scope": "eq", "trust": 0.4, "vendor": "cogent", "version": "7.1.1.63" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.0.2" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6" }, { "model": "real-time systems cogent datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6" }, { "model": "real-time systems opc datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" }, { "model": "real-time systems cogent datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": "real-time systems cascade datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "6.4.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.0.2" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "7.1.1" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "cogent datahub", "version": "*" } ], "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" }, { "db": "BID", "id": "49611" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNNVD", "id": "CNNVD-201109-266" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002275" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma", "sources": [ { "db": "BID", "id": "49611" }, { "db": "CNNVD", "id": "CNNVD-201109-183" } ], "trust": 0.9 }, "cve": "CVE-2011-3493", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2011-3493", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "a53a59e4-2354-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3493", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-3493", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201109-266", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" }, { "author": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNNVD", "id": "CNNVD-201109-266" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple stack-based buffer overflows in the DH_OneSecondTick function in Cogent DataHub 7.1.1.63 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long (1) domain, (2) report_domain, (3) register_datahub, or (4) slave commands. The software incorrectly handles the Content-Length field (-1 or 4294967295) plus one, which can cause integer overflow. Cogent DataHub is software for SCADA and automation. Cogent DataHub has server/service listening ports 4052 and 4053, except that the second port uses SSL, the first one uses plaintext. Cogent DataHub is prone to multiple buffer-overflow and integer-overflow vulnerabilities. \nSuccessfully exploiting these issues may allow attackers to execute arbitrary code within the context of the privileged domain (Dom0). Failed attempts will likely cause denial-of-service conditions. \nCogent DataHub 7.1.1.63 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2011-3493" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" }, { "db": "BID", "id": "49611" }, { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" } ], "trust": 3.51 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3493", "trust": 3.3 }, { "db": "ICS CERT ALERT", "id": "ICS-ALERT-11-256-03", "trust": 2.4 }, { "db": "BID", "id": "49611", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201109-266", "trust": 1.2 }, { "db": "ICS CERT", "id": "ICSA-11-280-01", "trust": 1.1 }, { "db": "CNVD", "id": "CNVD-2011-3667", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2011-3666", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-002275", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201109-183", "trust": 0.6 }, { "db": "IVD", "id": "8B513FFE-1F88-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "A53A59E4-2354-11E6-ABEF-000C29C66E3D", "trust": 0.2 }, { "db": "IVD", "id": "8D018FE8-1F88-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" }, { "db": "BID", "id": "49611" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNNVD", "id": "CNNVD-201109-183" }, { "db": "CNNVD", "id": "CNNVD-201109-266" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "id": "VAR-201109-0186", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" } ], "trust": 2.52033408 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 1.8 } ], "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" } ] }, "last_update_date": "2024-11-23T22:08:58.931000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.cogentdatahub.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.cogentdatahub.com/jp/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002275" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://aluigi.altervista.org/adv/cogent_1-adv.txt" }, { "trust": 2.4, "url": "http://www.us-cert.gov/control_systems/pdf/ics-alert-11-256-03.pdf" }, { "trust": 1.1, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-11-280-01.pdf" }, { "trust": 0.9, "url": "http://aluigi.altervista.org/adv/cogent_3-adv.txt" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3493" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3493" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/49611" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" }, { "trust": 0.3, "url": "http://aluigi.org/poc/cogent_3.dat" }, { "trust": 0.3, "url": "http://aluigi.org/poc/cogent_1.dat" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" }, { "db": "BID", "id": "49611" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNNVD", "id": "CNNVD-201109-183" }, { "db": "CNNVD", "id": "CNNVD-201109-266" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" }, { "db": "CNVD", "id": "CNVD-2011-3666" }, { "db": "BID", "id": "49611" }, { "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "db": "CNNVD", "id": "CNNVD-201109-183" }, { "db": "CNNVD", "id": "CNNVD-201109-266" }, { "db": "NVD", "id": "CVE-2011-3493" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "date": "2011-09-19T00:00:00", "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3667" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3666" }, { "date": "2011-09-13T00:00:00", "db": "BID", "id": "49611" }, { "date": "2011-09-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-183" }, { "date": "2011-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-266" }, { "date": "2011-09-16T14:28:13.107000", "db": "NVD", "id": "CVE-2011-3493" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3667" }, { "date": "2011-09-15T00:00:00", "db": "CNVD", "id": "CNVD-2011-3666" }, { "date": "2015-03-19T08:47:00", "db": "BID", "id": "49611" }, { "date": "2012-02-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002275" }, { "date": "2011-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-183" }, { "date": "2011-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201109-266" }, { "date": "2024-11-21T01:30:35.533000", "db": "NVD", "id": "CVE-2011-3493" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "49611" }, { "db": "CNNVD", "id": "CNNVD-201109-183" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub Integer Overflow Vulnerability", "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2011-3667" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow", "sources": [ { "db": "IVD", "id": "8b513ffe-1f88-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "a53a59e4-2354-11e6-abef-000c29c66e3d" }, { "db": "IVD", "id": "8d018fe8-1f88-11e6-abef-000c29c66e3d" }, { "db": "CNNVD", "id": "CNNVD-201109-183" }, { "db": "CNNVD", "id": "CNNVD-201109-266" } ], "trust": 1.8 } }
var-201201-0118
Vulnerability from variot
CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a HTTP header injection vulnerability (also known as CRLF, carriage return line feed, injection vulnerability). Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a remote attacker sends a crafted HTTP header to a vulnerable system, forged information may be displayed on the user's web browser or an HTTP response splitting attack may be conducted. The following versions are vulnerable: OPC DataHub Cascade DataHub Cogent DataHub. ----------------------------------------------------------------------
Secunia is hiring!
Find your next job here:
http://secunia.com/company/jobs/
TITLE: Cogent DataHub Cross-Site Scripting and HTTP Header Injection Vulnerabilities
SECUNIA ADVISORY ID: SA47496
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47496/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
RELEASE DATE: 2012-01-11
DISCUSS ADVISORY: http://secunia.com/advisories/47496/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/47496/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47496
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.
1) Certain unspecified input is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Certain unspecified input is not properly sanitised before being used to display HTTP headers. This can be exploited to include arbitrary HTTP headers in a response sent to the user.
SOLUTION: Update to version 7.2.0.
ORIGINAL ADVISORY: JVN: http://jvn.jp/en/jp/JVN63249231/index.html http://jvn.jp/en/jp/JVN12983784/index.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html http://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html
Cogent: http://www.cogentdatahub.com/ReleaseNotes.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201201-0118", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.1.63" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.1.0" }, { "model": "cogent datahub", "scope": "eq", "trust": 1.6, "vendor": "cogentdatahub", "version": "7.0.2" }, { "model": "cascade datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "opc datahub", "scope": "lte", "trust": 1.0, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cascade datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v6.4.20" }, { "model": "datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v7.1.2" }, { "model": "opc datahub", "scope": "lte", "trust": 0.8, "vendor": "cogent real time", "version": "v6.4.20" }, { "model": "real-time systems opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "real-time systems datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "7.1.2" }, { "model": "real-time systems cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogent", "version": "6.4.21" }, { "model": "opc datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "6.4.20" }, { "model": "cogent datahub", "scope": "eq", "trust": 0.6, "vendor": "cogentdatahub", "version": "7.1.2" }, { "model": "opc datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.21" }, { "model": "datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "7.1.2" }, { "model": "cascade datahub", "scope": "eq", "trust": 0.3, "vendor": "cogent", "version": "6.4.21" }, { "model": "opc datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2" }, { "model": "datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2" }, { "model": "cascade datahub", "scope": "ne", "trust": 0.3, "vendor": "cogent", "version": "7.2.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "CNNVD", "id": "CNNVD-201201-159" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:cogentdatahub:cascade_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:cogent_datahub", "vulnerable": true }, { "cpe22Uri": "cpe:/a:cogentdatahub:opc_datahub", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000002" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Kuang-Chun Hung of Security Research and Service Institute, ICST", "sources": [ { "db": "BID", "id": "51375" } ], "trust": 0.3 }, "cve": "CVE-2012-0310", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2012-0310", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2012-000002", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0310", "trust": 1.0, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2012-000002", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201201-159", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2012-0310", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2012-0310" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "CNNVD", "id": "CNNVD-201201-159" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CRLF injection vulnerability in Cogent DataHub 7.1.2 and earlier, Cascade DataHub 6.4.20 and earlier, and OPC DataHub 6.4.20 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors. Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a HTTP header injection vulnerability (also known as CRLF, carriage return line feed, injection vulnerability). Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.If a remote attacker sends a crafted HTTP header to a vulnerable system, forged information may be displayed on the user\u0027s web browser or an HTTP response splitting attack may be conducted. \nThe following versions are vulnerable:\nOPC DataHub\nCascade DataHub\nCogent DataHub. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nCogent DataHub Cross-Site Scripting and HTTP Header Injection\nVulnerabilities\n\nSECUNIA ADVISORY ID:\nSA47496\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47496/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496\n\nRELEASE DATE:\n2012-01-11\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47496/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47496/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nTwo vulnerabilities have been reported in Cogent DataHub, which can\nbe exploited by malicious people to conduct cross-site scripting\nattacks and HTTP response splitting attacks. \n\n1) Certain unspecified input is not properly sanitised before being\nreturned to the user. This can be exploited to execute arbitrary HTML\nand script code in a user\u0027s browser session in context of an affected\nsite. \n\n2) Certain unspecified input is not properly sanitised before being\nused to display HTTP headers. This can be exploited to include\narbitrary HTTP headers in a response sent to the user. \n\nSOLUTION:\nUpdate to version 7.2.0. \n\nORIGINAL ADVISORY:\nJVN:\nhttp://jvn.jp/en/jp/JVN63249231/index.html\nhttp://jvn.jp/en/jp/JVN12983784/index.html\nhttp://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000002.html\nhttp://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000001.html\n\nCogent:\nhttp://www.cogentdatahub.com/ReleaseNotes.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0310" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "BID", "id": "51375" }, { "db": "VULMON", "id": "CVE-2012-0310" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "JVNDB", "id": "JVNDB-2012-000002", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2012-0310", "trust": 2.8 }, { "db": "JVN", "id": "JVN63249231", "trust": 2.7 }, { "db": "ICS CERT", "id": "ICSA-12-016-01", "trust": 2.2 }, { "db": "BID", "id": "51375", "trust": 2.0 }, { "db": "SECUNIA", "id": "47496", "trust": 1.4 }, { "db": "SECUNIA", "id": "47525", "trust": 1.4 }, { "db": "CNVD", "id": "CNVD-2012-0097", "trust": 0.6 }, { "db": "JVN", "id": "JVN#63249231", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201201-159", "trust": 0.6 }, { "db": "JVN", "id": "JVN12983784", "trust": 0.2 }, { "db": "JVNDB", "id": "JVNDB-2012-000001", "trust": 0.2 }, { "db": "VULMON", "id": "CVE-2012-0310", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108568", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108571", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "VULMON", "id": "CVE-2012-0310" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-159" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "id": "VAR-201201-0118", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" } ], "trust": 1.3203340799999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" } ] }, "last_update_date": "2024-11-23T22:02:44.163000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Release Notes", "trust": 0.8, "url": "http://www.cogentdatahub.com/ReleaseNotes.html" }, { "title": "Download Software", "trust": 0.8, "url": "http://www.cogentdatahub.com/Download_Software.html" }, { "title": "Patches for unclear HTTP header injection vulnerabilities in multiple DataHub products", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/7311" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://jvn.jp/en/jp/jvn63249231/index.html" }, { "trust": 2.2, "url": "http://www.cogentdatahub.com/releasenotes.html" }, { "trust": 2.2, "url": "http://www.us-cert.gov/control_systems/pdf/icsa-12-016-01.pdf" }, { "trust": 1.7, "url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000002" }, { "trust": 1.1, "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000002.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/47496" }, { "trust": 1.1, "url": "http://secunia.com/advisories/47525" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/51375" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72306" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0310" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0310" }, { "trust": 0.3, "url": "http://www.cogentdatahub.com/products/cogent_datahub.html" }, { "trust": 0.2, "url": "http://secunia.com/company/jobs/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://jvn.jp/en/jp/jvn12983784/index.html" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://jvndb.jvn.jp/en/contents/2012/jvndb-2012-000001.html" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47496/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47496/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47496" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47525/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47525/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47525" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "VULMON", "id": "CVE-2012-0310" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-159" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-0097" }, { "db": "VULMON", "id": "CVE-2012-0310" }, { "db": "BID", "id": "51375" }, { "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "db": "PACKETSTORM", "id": "108568" }, { "db": "PACKETSTORM", "id": "108571" }, { "db": "CNNVD", "id": "CNNVD-201201-159" }, { "db": "NVD", "id": "CVE-2012-0310" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2012-0097" }, { "date": "2012-01-13T00:00:00", "db": "VULMON", "id": "CVE-2012-0310" }, { "date": "2012-01-11T00:00:00", "db": "BID", "id": "51375" }, { "date": "2012-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "date": "2012-01-11T06:58:06", "db": "PACKETSTORM", "id": "108568" }, { "date": "2012-01-11T06:58:15", "db": "PACKETSTORM", "id": "108571" }, { "date": "2012-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-159" }, { "date": "2012-01-13T04:14:39.037000", "db": "NVD", "id": "CVE-2012-0310" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-01-13T00:00:00", "db": "CNVD", "id": "CNVD-2012-0097" }, { "date": "2017-08-29T00:00:00", "db": "VULMON", "id": "CVE-2012-0310" }, { "date": "2015-03-19T08:38:00", "db": "BID", "id": "51375" }, { "date": "2012-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-000002" }, { "date": "2012-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-159" }, { "date": "2024-11-21T01:34:46.497000", "db": "NVD", "id": "CVE-2012-0310" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-159" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub vulnerable to HTTP header injection", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-000002" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-159" } ], "trust": 0.6 } }
var-201408-0410
Vulnerability from variot
Cogent DataHub is software for SCADA and automation. Cogent DataHub has a remote directory traversal vulnerability due to a program failing to properly filter user-supplied input. Allows an attacker to exploit a vulnerability to access a restricted directory
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201408-0410", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "real-time systems cogent datahub", "scope": null, "trust": 0.6, "vendor": "cogent", "version": null }, { "model": "real-time systems", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" }, { "model": "datahub", "scope": "eq", "trust": 0.2, "vendor": "cogent", "version": "*" } ], "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2014-05298", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "8098898a-1ec2-11e6-abef-000c29c66e3d", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [], "severity": [ { "author": "CNVD", "id": "CNVD-2014-05298", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub is software for SCADA and automation. Cogent DataHub has a remote directory traversal vulnerability due to a program failing to properly filter user-supplied input. Allows an attacker to exploit a vulnerability to access a restricted directory", "sources": [ { "db": "CNVD", "id": "CNVD-2014-05298" }, { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" } ], "trust": 0.72 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-05298", "trust": 0.8 }, { "db": "OSVDB", "id": "110482", "trust": 0.6 }, { "db": "IVD", "id": "8098898A-1EC2-11E6-ABEF-000C29C66E3D", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "id": "VAR-201408-0410", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ], "trust": 1.5661290300000001 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "last_update_date": "2022-05-17T01:36:51.868000Z", "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 0.6, "url": "http://osvdb.com/show/osvdb/110482" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-29T00:00:00", "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "date": "2014-08-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-08-29T00:00:00", "db": "CNVD", "id": "CNVD-2014-05298" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cogent DataHub Remote Directory Traversal Vulnerability", "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" }, { "db": "CNVD", "id": "CNVD-2014-05298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Path traversal", "sources": [ { "db": "IVD", "id": "8098898a-1ec2-11e6-abef-000c29c66e3d" } ], "trust": 0.2 } }
CVE-2014-2353 (GCVE-0-2014-2353)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DataHub", "vendor": "Cogent", "versions": [ { "lessThan": "7.3.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alain Homewood" } ], "datePublic": "2014-05-29T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\nCross-site scripting (XSS) vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.\n\n\u003c/p\u003e" } ], "value": "Cross-site scripting (XSS) vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-03T16:30:38.263Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-149-02" }, { "url": "http://cogentdatahub.com/Download_Software.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://cogentdatahub.com/Download_Software.html\"\u003ehttp://cogentdatahub.com/Download_Software.html\u003c/a\u003e\u003c/p\u003eCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://crackstation.net/\"\u003ehttps://crackstation.net/\u003c/a\u003e.\n\n\u003cbr\u003e" } ], "value": "Cogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\n\n\n http://cogentdatahub.com/Download_Software.html \n\nCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: https://crackstation.net/ ." } ], "source": { "advisory": "ICSA-14-149-02", "discovery": "EXTERNAL" }, "title": "Cogent DataHub XSS", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-2352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-2353", "datePublished": "2014-05-30T23:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2025-10-03T16:30:38.263Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2354 (GCVE-0-2014-2354)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DataHub", "vendor": "Cogent", "versions": [ { "lessThan": "7.3.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alain Homewood" } ], "datePublic": "2014-05-29T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\n\n\nCogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack.\n\n\u003c/p\u003e" } ], "value": "Cogent DataHub before 7.3.5 does not use a salt during password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force attack." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-916", "description": "CWE-916", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-03T16:34:03.154Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-149-02" }, { "url": "http://cogentdatahub.com/Download_Software.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://cogentdatahub.com/Download_Software.html\"\u003ehttp://cogentdatahub.com/Download_Software.html\u003c/a\u003e\u003c/p\u003eCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://crackstation.net/\"\u003ehttps://crackstation.net/\u003c/a\u003e.\n\n\u003cbr\u003e" } ], "value": "Cogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\n\n\n http://cogentdatahub.com/Download_Software.html \n\nCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: https://crackstation.net/ ." } ], "source": { "advisory": "ICSA-14-149-02", "discovery": "EXTERNAL" }, "title": "Cogent DataHub Use of Password Hash With Insufficient Computational Effort", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-2352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-2354", "datePublished": "2014-05-30T23:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2025-10-03T16:34:03.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2352 (GCVE-0-2014-2352)
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.305Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DataHub", "vendor": "Cogent", "versions": [ { "lessThan": "7.3.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Alain Homewood" } ], "datePublic": "2014-05-29T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\n\nThe directory specifier can include designators that can be used to \ntraverse the directory path. Exploiting this vulnerability may enable an\n attacker to access a limited number of hardcoded file types. Further \nexploitation of this vulnerability may allow an attacker to cause the \nweb server component to enter a denial-of-service condition.\n\n\u003c/p\u003e" } ], "value": "The directory specifier can include designators that can be used to \ntraverse the directory path. Exploiting this vulnerability may enable an\n attacker to access a limited number of hardcoded file types. Further \nexploitation of this vulnerability may allow an attacker to cause the \nweb server component to enter a denial-of-service condition." } ], "metrics": [ { "cvssV2_0": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-03T16:31:41.797Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-149-02" }, { "url": "http://cogentdatahub.com/Download_Software.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"http://cogentdatahub.com/Download_Software.html\"\u003ehttp://cogentdatahub.com/Download_Software.html\u003c/a\u003e\u003c/p\u003eCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://crackstation.net/\"\u003ehttps://crackstation.net/\u003c/a\u003e.\n\n\u003cbr\u003e" } ], "value": "Cogent Real-Time Systems, Inc. has produced a new version of the \nCogent DataHub application, Version 7.3.5, that fixes three of the four \nidentified vulnerabilities. The updated version is available at the \nfollowing address:\n\n\n http://cogentdatahub.com/Download_Software.html \n\nCogent\n has indicated that it will not be fixing the cryptographic weaknesses \nof hashed usernames and passwords because of compatibility issues with \nexisting systems. Cogent and the researcher agree that an effective \nmitigation strategy for users is to select sufficiently strong \npasswords. Cogent has indicated that password hashes can be checked for \nstrength using sites such as: https://crackstation.net/ ." } ], "source": { "advisory": "ICSA-14-149-02", "discovery": "EXTERNAL" }, "title": "Cogent DataHub Path Traversal", "x_generator": { "engine": "Vulnogram 0.2.0" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2014-2352", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in Cogent DataHub before 7.3.5 allows remote attackers to read arbitrary files of unspecified types, or cause a web-server denial of service, via a crafted pathname." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02", "refsource": "MISC", "url": "http://ics-cert.us-cert.gov/advisories/ICSA-14-149-02" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2014-2352", "datePublished": "2014-05-30T23:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2025-10-03T16:31:41.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }