Apache Traffic Server Host HTTP XSS

medium Nessus Plugin ID 79624

Synopsis

The remote caching server is affected by a cross-site scripting vulnerability.

Description

The version of Apache Traffic Server running on the remote host is affected by a cross-site scripting vulnerability due to a failure to properly sanitize user-supplied input. By sending a specially crafted host header, a remote, unauthenticated attacker can execute arbitrary script code in the victim's browser in the context of the affected site.

Solution

Upgrade to Apache Traffic Server 4.2.0 or later.

See Also

https://seclists.org/oss-sec/2014/q4/545

Plugin Details

Severity: Medium

ID: 79624

File Name: apache_traffic_server_host_xss.nasl

Version: 1.6

Type: remote

Published: 11/28/2014

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Required KB Items: www/apache_traffic_server

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 3/21/2014

Vulnerability Publication Date: 11/6/2014

Reference Information

BID: 70970

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990