Korean
<< Back
VID 22495
Severity 40
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The remote web server is using the WebLogic plug-in for Apache, IIS, or Sun web servers, a module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an HTTP server to WebLogic.

The version of this plug-in on the remote host is affected by an HTTP injection vulnerability because it fails to sanitize request headers of special characters, such as new lines, before passing them to WebLogic application servers.

An unauthenticated remote attacker may be able to exploit this issue to conduct a variety of attacks, such as trusted header injection and HTTP request smuggling.

* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.

* References:
http://www.vsecurity.com/resources/advisory/20100713-1/
http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html

* Platforms Affected:
Oracle WebLogic Server 11gR1 releases
Oracle WebLogic Server 10gR3 release
Oracle WebLogic Server 10.0 through MP2
Oracle WebLogic Server 9.0, 9.1, 9.2 through MP3
Oracle WebLogic Server 8.1 through SP6
Oracle WebLogic Server 7.0 through SP7
Any operating system Any version
Recommendation Oracle has released a Critical Patch Update to address these issues. Information regarding obtaining and applying an appropriate patch can be found in the Oracle Critical Patch Update Advisory dated July 2010 at http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html
Related URL CVE-2010-2375 (CVE)
Related URL 41620 (SecurityFocus)
Related URL (ISS)