VID |
22495 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
Servlet |
Detailed Description |
The remote web server is using the WebLogic plug-in for Apache, IIS, or Sun web servers, a module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an HTTP server to WebLogic.
The version of this plug-in on the remote host is affected by an HTTP injection vulnerability because it fails to sanitize request headers of special characters, such as new lines, before passing them to WebLogic application servers.
An unauthenticated remote attacker may be able to exploit this issue to conduct a variety of attacks, such as trusted header injection and HTTP request smuggling.
* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.
* References: http://www.vsecurity.com/resources/advisory/20100713-1/ http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html
* Platforms Affected: Oracle WebLogic Server 11gR1 releases Oracle WebLogic Server 10gR3 release Oracle WebLogic Server 10.0 through MP2 Oracle WebLogic Server 9.0, 9.1, 9.2 through MP3 Oracle WebLogic Server 8.1 through SP6 Oracle WebLogic Server 7.0 through SP7 Any operating system Any version |
Recommendation |
Oracle has released a Critical Patch Update to address these issues. Information regarding obtaining and applying an appropriate patch can be found in the Oracle Critical Patch Update Advisory dated July 2010 at http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html |
Related URL |
CVE-2010-2375 (CVE) |
Related URL |
41620 (SecurityFocus) |
Related URL |
(ISS) |
|