Hi,
A customer of ours has had PCIDSS check done and failed, the report came back with the following but not sure what to do. They only have one website behind the firewall, exchange owa. Looking at the details, its referring to the UTM as the Host OS isnt Microsoft. The user portal is disabled too. Any advice or comments would be really useful and thanks in advance
Category |
Web Application |
CVE |
- |
CVSS base score |
6.4 |
Description |
Redirection via Arbitrary Host Header Manipulation |
Host |
REMOVED |
Threat |
- |
Impact |
- |
Solution |
- |
PCI compliant |
No |
PCI details |
- |
Reason |
The vulnerability is not included in the NVD. |
PCI severity |
medium |
Port |
443 / tcp |
Host name |
No registered hostname |
Host OS |
EulerOS / Ubuntu / Fedora / Tiny Core Linux / Linux 3.x / IBM / FortiSOAR |
Result url: https://REMOVED/eup |
|
CVSS Base Score |
6.4- AV:N/AC:L/Au:N/C:P/I:P/A:N |
CVSS Temporal Score |
4.7- E:U/RL:W/RC:UC |
Severity |
3 |
Category |
Web Application |
CVE ID |
|
Vendor Reference |
|
Bugtraq ID |
|
Date Updated |
Sep 5, 2023 |
Threat |
The Host header is an HTTP request header that specifies the domain name of the server the client is trying to communicate with. It allows a single web server to host multiple websites by distinguishing between them based on the domain name provided in the Host header. Redirection via Arbitrary Host Header Manipulation is a security vulnerability that occurs when an attacker manipulates the Host header in an HTTP request to inject malicious data. By doing so, the attacker can trick the web server into processing the request as if it were directed to a different domain. This can lead to various types of attacks, such as website defacement, session hijacking, and cross-site scripting (XSS). QID Detection Logic:
|
Impact |
Attackers can redirect users to malicious content, deface websites, or trick users into disclosing sensitive information through phishing attacks. |
Solution |
Implementing proper validation and sanitization of input headers is essential to mitigate the risks of Host header injection. |
This thread was automatically locked due to age.