Article ID: 7057, created on Feb 12, 2010, last review on Apr 25, 2014

  • Applies to:
  • Plesk 8.6 for Linux/Unix


Informe del análisis:

Security warning found on port/service "pcsync-https (8443/tcp)"
Plugin "Expect Header Cross-Site Scripting Vulnerability"
Category "CGI abuses : XSS "
Priority "Medium Priority "Synopsis : The remote web server is vulnerable to a cross-site scripting
attack. Description : The remote web server fails to sanitize the contents of an 'Expect'
request header before using it to generate dynamic web content. An unauthenticated
remote attacker may be able to leverage this issue to launch cross-site scripting attacks
against the affected service, perhaps through specially-crafted ShockWave (SWF) files.
See also:
Solution : Check with the vendor for an update to the web server. For Apache, the issue is reportedly
fixed by versions 1.3.35 / 2.0.57 / 2.2.2 for IBM HTTP Server, upgrade to / for IBM
WebSphere Application Server, upgrade to
Risk factor : Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
BID : 19661, 26457 Other references : OSVDB:27487, OSVDB:27488, OSVDB:38700



Para corregir esta vulnerabilidad (el código del error obtenido puede contener algún script), le recomendamos añadir la opción ErrorDocument a la configuración del servicio Apache que sirve Parallels Panel.

Para ello, cree el archivo /usr/local/psa/admin/conf/httpsd.custom.include que contenga el registro:

ErrorDocument 417 "Expect not supported"

Ahora reiniciar el servicio Apache de Plesk:

~# /etc/init.d/psa restart1

9fa0130c84cac4b292697ade62270a40 a914db3fdc7a53ddcfd1b2db8f5a1b9c 29d1e90fd304f01e6420fbe60f66f838 b8ef5052d936e902043e41759118114e 56797cefb1efc9130f7c48a7d1db0f0c

Email subscription for changes to this article
Save as PDF