Korean
<< Back
VID 21813
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Web server has a CGI file vulnerable to a HTTP Header CRLF Injection Cross-Site Scripting attack. The relevant CGI could allow a remote attacker to inject arbitrary HTML and script code, caused by improper validation of user-supplied input passed to the specific parameter of the CGI that is being used in the HTTP headers. By sending a specially-crafted HTTP request containing a Carriage Return and Line Feed sequence ("%0d%0a"), a remote attacker could add HTTP headers to the response and completely write the body of the HTTP request. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks. Especially, when this attack could modify HTTP headers, client browsers might even be forced to download arbitrary files.

* References:
http://www.securiteam.com/securityreviews/5WP022K75O.html
http://www.spidynamics.com/support/whitepapers/SPIcross-sitescripting.pdf

* Platforms Affected:
Any HTTP server Any version
Any operating system Any version
Recommendation Modify the affected CGI script to perform proper validation of user-supplied input passed to the specific parameter of the CGI that is being used in the HTTP headers. For details, please see the web site at http://stuff.mit.edu/afs/athena/astaff/reference/cert/Tips/cgi_metacharacters
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)