WebSphere HTML 'Expect' Header HTML Injection

medium Nessus Network Monitor Plugin ID 4286

Synopsis

The remote host is vulnerable to an HTML injection attack.

Description

The remote server is a WebSphere server.
This version is reported to be vulnerable to an HTML injection flaw. An attacker exploiting this flaw would need to create a custom request that utilized custom 'Expect' headers and be able to convince unsuspecting users to launch the URI. Successful exploitation would result in an attacker gaining access to confidential client data.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www-1.ibm.com/support/docview.wss?uid=swg24017314

Plugin Details

Severity: Medium

ID: 4286

Family: Web Servers

Published: 11/15/2007

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Reference Information

CVE: CVE-2007-5944

BID: 26457