CVE-2007-4465

Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=186219 Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 Broken Link
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html Mailing List
http://marc.info/?l=bugtraq&m=124654546101607&w=2 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=125631037611762&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/26842 Broken Link
http://secunia.com/advisories/26952 Broken Link
http://secunia.com/advisories/27563 Broken Link
http://secunia.com/advisories/27732 Broken Link
http://secunia.com/advisories/28467 Broken Link
http://secunia.com/advisories/28471 Broken Link
http://secunia.com/advisories/28607 Broken Link
http://secunia.com/advisories/28749 Broken Link
http://secunia.com/advisories/30430 Broken Link
http://secunia.com/advisories/31651 Broken Link
http://secunia.com/advisories/33105 Broken Link
http://secunia.com/advisories/35650 Broken Link
http://security.gentoo.org/glsa/glsa-200711-06.xml Third Party Advisory
http://securityreason.com/achievement_securityalert/46 Third Party Advisory
http://securityreason.com/securityalert/3113 Third Party Advisory
http://securitytracker.com/id?1019194 Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm Third Party Advisory
http://www.apache.org/dist/httpd/CHANGES_2.2.6 Broken Link
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_61_apache2.html Third Party Advisory
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0911.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0004.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0005.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0006.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0008.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0261.html Broken Link
http://www.securityfocus.com/archive/1/479237/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/25653 Patch Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-575-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1697 Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 Broken Link
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

19 Jan 2024, 15:13

Type Values Removed Values Added
References (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry

22 Dec 2023, 19:36

Type Values Removed Values Added
References (SECUNIA) http://secunia.com/advisories/26952 - (SECUNIA) http://secunia.com/advisories/26952 - Broken Link
References (CERT) http://www.us-cert.gov/cas/techalerts/TA08-150A.html - US Government Resource (CERT) http://www.us-cert.gov/cas/techalerts/TA08-150A.html - Third Party Advisory, US Government Resource
References (SECUNIA) http://secunia.com/advisories/30430 - (SECUNIA) http://secunia.com/advisories/30430 - Broken Link
References (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=186219 - (CONFIRM) http://bugs.gentoo.org/show_bug.cgi?id=186219 - Third Party Advisory
References (SREASON) http://securityreason.com/securityalert/3113 - (SREASON) http://securityreason.com/securityalert/3113 - Third Party Advisory
References (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 - (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 - Broken Link
References (SECUNIA) http://secunia.com/advisories/28607 - (SECUNIA) http://secunia.com/advisories/28607 - Broken Link
References (SUSE) http://www.novell.com/linux/security/advisories/2007_61_apache2.html - (SUSE) http://www.novell.com/linux/security/advisories/2007_61_apache2.html - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0006.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0006.html - Broken Link
References (HP) http://marc.info/?l=bugtraq&m=125631037611762&w=2 - (HP) http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Mailing List, Third Party Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - (APPLE) http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - Mailing List
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0261.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0261.html - Broken Link
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 - Broken Link
References (SECUNIA) http://secunia.com/advisories/33105 - (SECUNIA) http://secunia.com/advisories/33105 - Broken Link
References (CONFIRM) http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html - (CONFIRM) http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html - Third Party Advisory
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0005.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0005.html - Broken Link
References (HP) http://marc.info/?l=bugtraq&m=124654546101607&w=2 - (HP) http://marc.info/?l=bugtraq&m=124654546101607&w=2 - Third Party Advisory, VDB Entry
References (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link
References (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 - (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/27563 - (SECUNIA) http://secunia.com/advisories/27563 - Broken Link
References (SECUNIA) http://secunia.com/advisories/26842 - (SECUNIA) http://secunia.com/advisories/26842 - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0911.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2007-0911.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/28467 - (SECUNIA) http://secunia.com/advisories/28467 - Broken Link
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html - Third Party Advisory
References (FEDORA) http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html - (FEDORA) http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html - Broken Link
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0008.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0008.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/31651 - (SECUNIA) http://secunia.com/advisories/31651 - Broken Link
References (SECUNIA) http://secunia.com/advisories/28471 - (SECUNIA) http://secunia.com/advisories/28471 - Broken Link
References (SECTRACK) http://securitytracker.com/id?1019194 - (SECTRACK) http://securitytracker.com/id?1019194 - Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/27732 - (SECUNIA) http://secunia.com/advisories/27732 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35650 - (SECUNIA) http://secunia.com/advisories/35650 - Broken Link
References (GENTOO) http://security.gentoo.org/glsa/glsa-200711-06.xml - (GENTOO) http://security.gentoo.org/glsa/glsa-200711-06.xml - Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2008/1697 - (VUPEN) http://www.vupen.com/english/advisories/2008/1697 - Permissions Required, Third Party Advisory
References (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm - (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm - Third Party Advisory
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.apache.org/dist/httpd/CHANGES_2.2.6 - (CONFIRM) http://www.apache.org/dist/httpd/CHANGES_2.2.6 - Broken Link
References (UBUNTU) http://www.ubuntu.com/usn/usn-575-1 - (UBUNTU) http://www.ubuntu.com/usn/usn-575-1 - Third Party Advisory
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 - (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 - Broken Link
References (BID) http://www.securityfocus.com/bid/25653 - Patch (BID) http://www.securityfocus.com/bid/25653 - Patch, Third Party Advisory, VDB Entry
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0004.html - (REDHAT) http://www.redhat.com/support/errata/RHSA-2008-0004.html - Broken Link
References (SECUNIA) http://secunia.com/advisories/28749 - (SECUNIA) http://secunia.com/advisories/28749 - Broken Link
References (SREASONRES) http://securityreason.com/achievement_securityalert/46 - (SREASONRES) http://securityreason.com/achievement_securityalert/46 - Third Party Advisory
CPE cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Information

Published : 2007-09-14 00:17

Updated : 2024-02-04 17:13


NVD link : CVE-2007-4465

Mitre link : CVE-2007-4465

CVE.ORG link : CVE-2007-4465


JSON object : View

Products Affected

apache

  • http_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')