Oracle WebLogic Server Plug-in HTTP Injection

This script is Copyright (C) 2010-2012 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a module that is affected by an HTTP
injection vulnerability.

Description :

The remote web server is using the WebLogic plug-in for Apache, IIS,
or Sun web servers, a module included with Oracle (formerly BEA)
WebLogic Server and used to proxy requests from an HTTP server to
WebLogic.

The version of this plug-in on the remote host is affected by an HTTP
injection vulnerability because it fails to sanitize request headers
of special characters, such as new lines, before passing them to
WebLogic application servers.

An unauthenticated, remote attacker may be able to exploit this issue
to conduct a variety of attacks, such as trusted header injection and
HTTP request smuggling.

See also :

http://www.vsecurity.com/resources/advisory/20100713-1/
http://www.oracle.com/technetwork/topics/security/cpujul2010-155308.html

Solution :

Apply the Oracle July 2010 Critical Patch Update (CPU).

Risk factor :

Medium / CVSS Base Score : 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 5.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 47898 ()

Bugtraq ID: 41620

CVE ID: CVE-2010-2375