vendor:
Oracle HTTP Server for Oracle Application Server 10g
by:
Yasser ABOUKIR
5.5
CVSS
MEDIUM
Unfiltered Header Injection
CI-79
CWE
Product Name: Oracle HTTP Server for Oracle Application Server 10g
Affected Version From: 10.1.2.0.2
Affected Version To: 10.1.2.0.0, 9.0.4.3.0, 9.0.4.2.0, 9.0.4.1.0, 9.0.4.0.0
Patch Exists: NO
Related CWE: CVE-2006-3918, CVE-2007-0275
CPE: oracle:oracle_http_server
Metasploit:
https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2010-0602/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2007-6203/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2007-6203/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2007-6203/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2007-6203/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2007-6203/, https://www.rapid7.com/db/vulnerabilities/ibm-was-cve-2007-5944/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2006-3918/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2006-0618/, https://www.rapid7.com/db/vulnerabilities/http-apache-expect-header-xss/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2006-0618/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2006-0619/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2006-3918/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-CESA-2006-0619/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2006-3918/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2006-3918/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2008-0523/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux, Windows Server 2003
2011
Oracle HTTP Server XSS Header Injection
The vulnerability is triggered when a malicious user sends a crafted HTTP request with an Expect header containing malicious JavaScript code. The malicious code is then reflected back in the response page and executed in the context of the vulnerable web application.
Mitigation:
Sanitize the Expect header from an HTTP request when it is reflected back in an error message