MEDIUM Vulnerabilities in Tenable Nessus scanning (44135 - Web Server Generic Cookie Injection)

parker0909

Well-Known Member
Aug 5, 2019
95
0
46
36
Hello,

We have user request the Tenable Nessus test passed without any Critical,high and medium problem. we can see that there have one Vulnerabilities call 44135 - Web Server Generic Cookie Injection. May i know any thing we can do to fix the Vulnerabilities?

Synopsis
The remote web server is prone to a cookie injection attack.

Description
The remote host is running a web server that fails to adequately sanitize request strings of malicious
JavaScript. By leveraging this issue, an attacker may be able to inject arbitrary cookies. Depending on
the structure of the web application, it may be possible to launch a 'session fixation' attack using this
mechanism.

Please note that :
- Nessus did not check if the session fixation attack is feasible.
- This is not the only vector of session fixation.
See Also
https://en.wikipedia.org/wiki/Session_fixation
https://www.owasp.org/index.php/Session_Fixation
http://www.acros.si/papers/session_fixation.pdf
http://projects.webappsec.org/w/page/13246960/Session Fixation
Solution
Contact the vendor for a patch or upgrade.

Risk Factor
Medium

CVSS v2.0 Base Score
4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

Plugin Information
Published: 2010/01/25, Modified: 2022/04/11

Plugin Output
tcp/8006/www

1745289273233.png
 
Hi,

first, if you think you found a security issue, please report according to https://pve.proxmox.com/wiki/Security_Reporting so it can go through the proper channels
second, as @EllerholdAG already mentioned, it seems there is no cookie injection at all

we return a 500 error with no explicit 'content-type' header, so the client shouldn't automatically interpret this as html content (and thus not execute any javascript contained)
(see https://httpwg.org/specs/rfc9110.html#field.content-type )