Bug 200732 (CVE-2006-3918) - CVE-2006-3918 httpd: Expect header XSS
Summary: CVE-2006-3918 httpd: Expect header XSS
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2006-3918
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Joe Orton
QA Contact:
URL:
Whiteboard:
Depends On: 413891 430780 430781 430782 449336 582767
Blocks:
TreeView+ depends on / blocked
 
Reported: 2006-07-31 12:49 UTC by Mark J. Cox
Modified: 2019-09-29 12:19 UTC (History)
2 users (show)

Fixed In Version: httpd 1.3.35
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-04-04 23:12:09 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2006:0619 0 normal SHIPPED_LIVE Moderate: httpd security update 2006-08-10 04:00:00 UTC
Red Hat Product Errata RHSA-2010:0602 0 normal SHIPPED_LIVE Moderate: Red Hat Certificate System 7.3 security update 2010-08-05 14:04:51 UTC

Description Mark J. Cox 2006-07-31 12:49:33 UTC
In May 2006 a reporter found a bug in Apache where an invalid Expect header sent
to the server (Apache 1.3.3 onwards) would be returned to the user in an error
message, unescaped.  This could allow a cross-site scripting attack only if a
victim can tricked into connecting to a site and sending such a carefully
crafted Expect header.  Whist browsers do not provide this functionality, it was
recently discovered that Flash allows you to make a connection with arbitrary
headers.  The attack mechanism is therefore:

1. User is tricked into visiting a malicious web site with a flash-enabled browser
2. Malicious web site uses a flash movie to make a connection to the target site
with custom Expect header
3. This results in cross-site scripting (attacker could steal your cookies from
the third party site, or inject content etc)

Note that this also affects RHEL2.1, and RHEL3.

On RHEL3 and RHEL4 the cross-site scripting does not happen immediately, step 3
is delayed until the Apache server times out.  On a default installation this
could be 2-5 minutes.  Therefore the attack is less likely to succeed.

Patch:
http://svn.apache.org/viewcvs?rev=394965&view=rev [1.3]
http://svn.apache.org/viewcvs?rev=395172&view=rev [2.0]

Comment 3 Joe Orton 2007-06-01 10:13:09 UTC
Fixed in errata: http://rhn.redhat.com/errata/RHSA-2006-0619.html

Comment 8 errata-xmlrpc 2010-08-04 21:31:22 UTC
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Comment 9 Vincent Danen 2013-04-04 23:12:09 UTC
This was fixed previously in these Red Hat products:

Red Hat Certificate System 7.3 for 4AS: RHSA-2010:0602
Red Hat Enterprise Linux version 2.1: RHSA-2006:0618
Red Hat Enterprise Linux version 3: RHSA-2006:0619
Red Hat Enterprise Linux version 4: RHSA-2006:0619
Red Hat Network Proxy v 4.2 (RHEL v.3 AS): RHSA-2008:0523
Red Hat Network Proxy v 4.2 (RHEL v.4 AS): RHSA-2008:0523
Stronghold 4 for Red Hat Enterprise Linux: RHSA-2006:0692


Note You need to log in before you can comment on or make changes to this bug.