Preview Tool

Cisco Bug: CSCur30862 - ASR5K ECS AoC Token not stripped properly from orginal URL

Last Modified

Dec 26, 2016

Products (1)

  • Cisco ASR 5000 Series

Known Affected Releases


Description (partial)

ASR5K PGW/GGSN while stripping out the token from the URL, is not removing the separator before the token (separator here used is '?')

AoC Use-case steps:

1.	 UE send orginal URL
2.	UE gets redirected to AoC Server. 
3.	AoC server appends original URL with TOKEN
4.	ASR5K send CCR-U with AVP:  URL+Token  to OCS
5.	OCS recognized TOKEN insertion and provides Quota
6.	UE gets HTTP 302 back to original URL+TOKEN
7.	ASR5K  received this original URL+TOKEN  from UE.
8.	ASR5K strips TOKEN
9.	ASR5K forwards  original URL to HTTP SERVER

At Step 8 when ASR5K strip the TOKEN, the '?' is not removed at the end of the HTTP-URL, and this caused issues at WebServer side when it tried to process the GET/POST request.

ECS: ECS AoC use-case with Token usage
ASR5K PGW/GGSN S/W Release: R15MR4 (build 55300)
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.