Web Server Expect Header XSS

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.


Synopsis :

The remote web server is vulnerable to a cross-site scripting attack.

Description :

The remote web server fails to sanitize the contents of an 'Expect'
request header before using it to generate dynamic web content. An
unauthenticated, remote attacker may be able to leverage this issue to
launch cross-site scripting attacks against the affected service,
perhaps through specially crafted ShockWave (SWF) files.

See also :

http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html
http://archives.neohapsis.com/archives/bugtraq/2006-05/0441.html
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html
http://www.apache.org/dist/httpd/CHANGES_2.2
http://www.apache.org/dist/httpd/CHANGES_2.0
http://www.apache.org/dist/httpd/CHANGES_1.3
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
http://www-1.ibm.com/support/docview.wss?uid=swg24017314

Solution :

Check with the vendor for an update to the web server. For Apache,
the issue is reportedly fixed by versions 1.3.35 / 2.0.57 / 2.2.2
for
IBM HTTP Server, upgrade to 6.0.2.13 / 6.1.0.1
for IBM WebSphere
Application Server, upgrade to 5.1.1.17.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 22254 ()

Bugtraq ID: 19661
26457

CVE ID: CVE-2006-3918
CVE-2007-5944

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial