Oracle WebLogic Server Plug-in HTTP Injection

medium Nessus Plugin ID 47898

Synopsis

The remote web server uses a module that is affected by an HTTP injection vulnerability.

Description

The remote web server is using the WebLogic plug-in for Apache, IIS, or Sun web servers, a module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an HTTP server to WebLogic.

The version of this plug-in on the remote host is affected by an HTTP injection vulnerability because it fails to sanitize request headers of special characters, such as new lines, before passing them to WebLogic application servers.

An unauthenticated, remote attacker may be able to exploit this issue to conduct a variety of attacks, such as trusted header injection and HTTP request smuggling.

Solution

Apply the Oracle July 2010 Critical Patch Update (CPU).

See Also

http://www.vsecurity.com/resources/advisory/20100713-1/

https://www.oracle.com/technetwork/topics/security/cpujul2010-155308.html

Plugin Details

Severity: Medium

ID: 47898

File Name: weblogic_plugin_http_injection.nasl

Version: 1.15

Type: remote

Family: Web Servers

Published: 7/29/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: cpe:/a:oracle:weblogic_server

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 7/13/2010

Vulnerability Publication Date: 7/13/2010

Reference Information

CVE: CVE-2010-2375

BID: 41620

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990