Cogent DataHub vulnerable to HTTP header injection


Cogent DataHub provided by Cogent Real-Time Systems Inc. contains a HTTP header injection vulnerability (also known as CRLF, carriage return line feed, injection vulnerability).

Kuang-Chun Hung of Security Research and Service Institute - Information and Communication Security Technology Center (ICST), Taiwan R.O.C. reported this vulnerability to JPCERT/CC.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products

Cogent Real-Time Systems Inc.
  • Cascade DataHub V6.4.20 and earlier
  • Cogent DataHub V7.1.2 and earlier
  • OPC DataHub V6.4.20 and earlier


If a remote attacker sends a crafted HTTP header to a vulnerable system, forged information may be displayed on the user's web browser or an HTTP response splitting attack may be conducted.

[Update the Software]
Update the software to the latest version according to the information provided by the developer.
Vendor Information

Cogent Real-Time Systems Inc.
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-0310

  1. JVN : JVN#63249231
  2. National Vulnerability Database (NVD) : CVE-2012-0310
  3. ICS-CERT ADVISORY : ICSA-12-016-01
Revision History

  • [2012/01/11]
      Web page published.
      Affected Products : Products versions were changed