Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
References
Configurations
Configuration 1 (hide)
|
History
19 Jan 2024, 15:13
Type | Values Removed | Values Added |
---|---|---|
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry |
22 Dec 2023, 19:36
Type | Values Removed | Values Added |
---|---|---|
References | (SECUNIA) http://secunia.com/advisories/26952 - Broken Link | |
References | (CERT) http://www.us-cert.gov/cas/techalerts/TA08-150A.html - Third Party Advisory, US Government Resource | |
References | (SECUNIA) http://secunia.com/advisories/30430 - Broken Link | |
References | (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=186219 - Third Party Advisory | |
References | (SREASON) http://securityreason.com/securityalert/3113 - Third Party Advisory | |
References | (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/28607 - Broken Link | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2007_61_apache2.html - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0006.html - Broken Link | |
References | (HP) http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Mailing List, Third Party Advisory | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - Mailing List | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0261.html - Broken Link | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/33105 - Broken Link | |
References | (CONFIRM) http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html - Third Party Advisory | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0005.html - Broken Link | |
References | (HP) http://marc.info/?l=bugtraq&m=124654546101607&w=2 - Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/27563 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26842 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0911.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/28467 - Broken Link | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html - Third Party Advisory | |
References | (FEDORA) http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0008.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/31651 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/28471 - Broken Link | |
References | (SECTRACK) http://securitytracker.com/id?1019194 - Third Party Advisory, VDB Entry | |
References | (SECUNIA) http://secunia.com/advisories/27732 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/35650 - Broken Link | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-200711-06.xml - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2008/1697 - Permissions Required, Third Party Advisory | |
References | (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm - Third Party Advisory | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 - Third Party Advisory, VDB Entry | |
References | (CONFIRM) http://www.apache.org/dist/httpd/CHANGES_2.2.6 - Broken Link | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-575-1 - Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/25653 - Patch, Third Party Advisory, VDB Entry | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0004.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/28749 - Broken Link | |
References | (SREASONRES) http://securityreason.com/achievement_securityalert/46 - Third Party Advisory | |
CPE | cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
Information
Published : 2007-09-14 00:17
Updated : 2024-02-04 17:13
NVD link : CVE-2007-4465
Mitre link : CVE-2007-4465
CVE.ORG link : CVE-2007-4465
JSON object : View
Products Affected
apache
- http_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')