Oracle WebLogic Server Plug-in HTTP Injection

Medium Nessus Plugin ID 47898


The remote web server uses a module that is affected by an HTTP injection vulnerability.


The remote web server is using the WebLogic plug-in for Apache, IIS, or Sun web servers, a module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an HTTP server to WebLogic.

The version of this plug-in on the remote host is affected by an HTTP injection vulnerability because it fails to sanitize request headers of special characters, such as new lines, before passing them to WebLogic application servers.

An unauthenticated, remote attacker may be able to exploit this issue to conduct a variety of attacks, such as trusted header injection and HTTP request smuggling.


Apply the Oracle July 2010 Critical Patch Update (CPU).

See Also

Plugin Details

Severity: Medium

ID: 47898

File Name: weblogic_plugin_http_injection.nasl

Version: $Revision: 1.12 $

Type: remote

Family: Web Servers

Published: 2010/07/29

Modified: 2015/09/24

Dependencies: 67257, 10107

Risk Information

Risk Factor: Medium


Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:weblogic_server

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2010/07/13

Vulnerability Publication Date: 2010/07/13

Reference Information

CVE: CVE-2010-2375

BID: 41620

OSVDB: 66359

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990