Article ID: 7057, created on Dec 25, 2009, last review on May 11, 2014

  • Applies to:
  • Plesk 8.6 for Linux/Unix


From scan report:
Security warning found on port/service "pcsync-https (8443/tcp)"
Plugin "Expect Header Cross-Site Scripting Vulnerability"
Category "CGI abuses : XSS "
Priority "Medium Priority "Synopsis : The remote web server is vulnerable to a cross-site scripting
attack. Description : The remote web server fails to sanitize the contents of an 'Expect'
request header before using it to generate dynamic web content. An unauthenticated
remote attacker may be able to leverage this issue to launch cross-site scripting attacks
against the affected service, perhaps through specially-crafted ShockWave (SWF) files.
See also:
Solution : Check with the vendor for an update to the web server. For Apache, the issue is reportedly
fixed by versions 1.3.35 / 2.0.57 / 2.2.2 for IBM HTTP Server, upgrade to / for IBM
WebSphere Application Server, upgrade to
Risk factor : Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
BID : 19661, 26457 Other references : OSVDB:27487, OSVDB:27488, OSVDB:38700



To fix the vulnerability (returned error code may contain some script) it is recommended that you add option ErrorDocument into configuration of Apache service that serves Parallels Panel.
For that create file /usr/local/psa/admin/conf/httpsd.custom.include that contains the record:

ErrorDocument 417 "Expect not supported"

And then restart Plesk Apache service:'

~# /etc/init.d/psa restart1

9fa0130c84cac4b292697ade62270a40 a914db3fdc7a53ddcfd1b2db8f5a1b9c 29d1e90fd304f01e6420fbe60f66f838 b8ef5052d936e902043e41759118114e 56797cefb1efc9130f7c48a7d1db0f0c

Email subscription for changes to this article
Save as PDF