Article ID: 7057, created on Jan 5, 2010, last review on Apr 17, 2012

  • Applies to:
  • Plesk 8.6 for Linux/Unix


Rapport du scan :
Security warning found on port/service "pcsync-https (8443/tcp)"
Plugin "Expect Header Cross-Site Scripting Vulnerability"
Category "CGI abuses : XSS "
Priority "Medium Priority "Synopsis : The remote web server is vulnerable to a cross-site scripting
attack. Description : The remote web server fails to sanitize the contents of an 'Expect'
request header before using it to generate dynamic web content. An unauthenticated
remote attacker may be able to leverage this issue to launch cross-site scripting attacks
against the affected service, perhaps through specially-crafted ShockWave (SWF) files.
See also:
Solution : Check with the vendor for an update to the web server. For Apache, the issue is reportedly
fixed by versions 1.3.35 / 2.0.57 / 2.2.2 for IBM HTTP Server, upgrade to / for IBM
WebSphere Application Server, upgrade to
Risk factor : Medium / CVSS Base Score : 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
BID : 19661, 26457 Other references : OSVDB:27487, OSVDB:27488, OSVDB:38700



Pour résoudre cette vulnérabilité (le code d'erreur retourné peut contenir du script), nous vous conseillons d'ajouter l'option ErrorDocument dans la configuration du service Apache qui sert Parallels Panel.
Pour ce faire, créez le fichier /usr/local/psa/admin/conf/httpsd.custom.include qui contient l'enregistrement :

ErrorDocument 417 "Expect not supported"

Puis redémarrez le service Apache de Plesk :'

~# /etc/init.d/psa restart1

9fa0130c84cac4b292697ade62270a40 a914db3fdc7a53ddcfd1b2db8f5a1b9c 29d1e90fd304f01e6420fbe60f66f838 b8ef5052d936e902043e41759118114e 56797cefb1efc9130f7c48a7d1db0f0c

Email subscription for changes to this article
Save as PDF