We are failing trustwave's PCI compliance scan on the following issue
Apache HTTP Server prior to version 2.2.22 contains a vulnerability that could allow an attacker to discover HTTP-only cookies by making a request with an extremely long cookie header field. This could be performed by script running in a victim user's browser.
Byte Length of cookie sent: 8250
Received status code responce: 400
Response body contained: The reflected value of the cookie
Our plesk 11.0.9 (Update #19) server is running Centos 5.8 with Apache 2.2.8
we have tried using the version of apache from the centos repository (http://centos.alt.ru/repository/centos/5/i386/httpd-2.2.23-3.el5.i386.rpm) but due to version dependances this has not been allowed to be installed..
Can you advise how to get this system PCI compliant?
Apache HTTP Server prior to version 2.2.22 contains a vulnerability that could allow an attacker to discover HTTP-only cookies by making a request with an extremely long cookie header field. This could be performed by script running in a victim user's browser.
Byte Length of cookie sent: 8250
Received status code responce: 400
Response body contained: The reflected value of the cookie
Our plesk 11.0.9 (Update #19) server is running Centos 5.8 with Apache 2.2.8
we have tried using the version of apache from the centos repository (http://centos.alt.ru/repository/centos/5/i386/httpd-2.2.23-3.el5.i386.rpm) but due to version dependances this has not been allowed to be installed..
Can you advise how to get this system PCI compliant?