Web Server Expect Header XSS

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote web server is vulnerable to a cross-site scripting attack.

Description :

The remote web server fails to sanitize the contents of an 'Expect'
request header before using it to generate dynamic web content. An
unauthenticated, remote attacker may be able to leverage this issue to
launch cross-site scripting attacks against the affected service,
perhaps through specially crafted ShockWave (SWF) files.

See also :

http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html
http://archives.neohapsis.com/archives/bugtraq/2006-05/0441.html
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html
http://www.apache.org/dist/httpd/CHANGES_2.2
http://www.apache.org/dist/httpd/CHANGES_2.0
http://www.apache.org/dist/httpd/CHANGES_1.3
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
http://www-1.ibm.com/support/docview.wss?uid=swg24017314

Solution :

Check with the vendor for an update to the web server. For Apache,
the issue is reportedly fixed by versions 1.3.35 / 2.0.57 / 2.2.2
for
IBM HTTP Server, upgrade to 6.0.2.13 / 6.1.0.1
for IBM WebSphere
Application Server, upgrade to 5.1.1.17.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 22254 ()

Bugtraq ID: 19661
26457

CVE ID: CVE-2006-3918
CVE-2007-5944