CVE-2007-4465

Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=186219 Third Party Advisory
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 Broken Link
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html Mailing List
http://marc.info/?l=bugtraq&m=124654546101607&w=2 Third Party Advisory VDB Entry
http://marc.info/?l=bugtraq&m=125631037611762&w=2 Mailing List Third Party Advisory
http://secunia.com/advisories/26842 Broken Link
http://secunia.com/advisories/26952 Broken Link
http://secunia.com/advisories/27563 Broken Link
http://secunia.com/advisories/27732 Broken Link
http://secunia.com/advisories/28467 Broken Link
http://secunia.com/advisories/28471 Broken Link
http://secunia.com/advisories/28607 Broken Link
http://secunia.com/advisories/28749 Broken Link
http://secunia.com/advisories/30430 Broken Link
http://secunia.com/advisories/31651 Broken Link
http://secunia.com/advisories/33105 Broken Link
http://secunia.com/advisories/35650 Broken Link
http://security.gentoo.org/glsa/glsa-200711-06.xml Third Party Advisory
http://securityreason.com/achievement_securityalert/46 Third Party Advisory
http://securityreason.com/securityalert/3113 Third Party Advisory
http://securitytracker.com/id?1019194 Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm Third Party Advisory
http://www.apache.org/dist/httpd/CHANGES_2.2.6 Broken Link
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 Third Party Advisory
http://www.novell.com/linux/security/advisories/2007_61_apache2.html Third Party Advisory
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0911.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0004.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0005.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0006.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0008.html Broken Link
http://www.redhat.com/support/errata/RHSA-2008-0261.html Broken Link
http://www.securityfocus.com/archive/1/479237/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/25653 Patch Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-575-1 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory US Government Resource
http://www.vupen.com/english/advisories/2008/1697 Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 Broken Link
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

19 Jan 2024, 15:13

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link () http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry

22 Dec 2023, 19:36

Type Values Removed Values Added
CPE cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
References () http://bugs.gentoo.org/show_bug.cgi?id=186219 - () http://bugs.gentoo.org/show_bug.cgi?id=186219 - Third Party Advisory
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432 - Broken Link
References () http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - () http://lists.apple.com/archives/security-announce/2008//May/msg00001.html - Mailing List
References () http://marc.info/?l=bugtraq&m=124654546101607&w=2 - () http://marc.info/?l=bugtraq&m=124654546101607&w=2 - Third Party Advisory, VDB Entry
References () http://marc.info/?l=bugtraq&m=125631037611762&w=2 - () http://marc.info/?l=bugtraq&m=125631037611762&w=2 - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/26842 - () http://secunia.com/advisories/26842 - Broken Link
References () http://secunia.com/advisories/26952 - () http://secunia.com/advisories/26952 - Broken Link
References () http://secunia.com/advisories/27563 - () http://secunia.com/advisories/27563 - Broken Link
References () http://secunia.com/advisories/27732 - () http://secunia.com/advisories/27732 - Broken Link
References () http://secunia.com/advisories/28467 - () http://secunia.com/advisories/28467 - Broken Link
References () http://secunia.com/advisories/28471 - () http://secunia.com/advisories/28471 - Broken Link
References () http://secunia.com/advisories/28607 - () http://secunia.com/advisories/28607 - Broken Link
References () http://secunia.com/advisories/28749 - () http://secunia.com/advisories/28749 - Broken Link
References () http://secunia.com/advisories/30430 - () http://secunia.com/advisories/30430 - Broken Link
References () http://secunia.com/advisories/31651 - () http://secunia.com/advisories/31651 - Broken Link
References () http://secunia.com/advisories/33105 - () http://secunia.com/advisories/33105 - Broken Link
References () http://secunia.com/advisories/35650 - () http://secunia.com/advisories/35650 - Broken Link
References () http://security.gentoo.org/glsa/glsa-200711-06.xml - () http://security.gentoo.org/glsa/glsa-200711-06.xml - Third Party Advisory
References () http://securityreason.com/achievement_securityalert/46 - () http://securityreason.com/achievement_securityalert/46 - Third Party Advisory
References () http://securityreason.com/securityalert/3113 - () http://securityreason.com/securityalert/3113 - Third Party Advisory
References () http://securitytracker.com/id?1019194 - () http://securitytracker.com/id?1019194 - Third Party Advisory, VDB Entry
References () http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm - () http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm - Third Party Advisory
References () http://www.apache.org/dist/httpd/CHANGES_2.2.6 - () http://www.apache.org/dist/httpd/CHANGES_2.2.6 - Broken Link
References () http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html - () http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 - () http://www.mandriva.com/security/advisories?name=MDVSA-2008:014 - Third Party Advisory
References () http://www.novell.com/linux/security/advisories/2007_61_apache2.html - () http://www.novell.com/linux/security/advisories/2007_61_apache2.html - Third Party Advisory
References () http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html - () http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2007-0911.html - () http://www.redhat.com/support/errata/RHSA-2007-0911.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2008-0004.html - () http://www.redhat.com/support/errata/RHSA-2008-0004.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2008-0005.html - () http://www.redhat.com/support/errata/RHSA-2008-0005.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2008-0006.html - () http://www.redhat.com/support/errata/RHSA-2008-0006.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2008-0008.html - () http://www.redhat.com/support/errata/RHSA-2008-0008.html - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2008-0261.html - () http://www.redhat.com/support/errata/RHSA-2008-0261.html - Broken Link
References () http://www.securityfocus.com/archive/1/479237/100/0/threaded - () http://www.securityfocus.com/archive/1/479237/100/0/threaded - Broken Link
References () http://www.securityfocus.com/bid/25653 - Patch () http://www.securityfocus.com/bid/25653 - Patch, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/usn-575-1 - () http://www.ubuntu.com/usn/usn-575-1 - Third Party Advisory
References () http://www.us-cert.gov/cas/techalerts/TA08-150A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-150A.html - Third Party Advisory, US Government Resource
References () http://www.vupen.com/english/advisories/2008/1697 - () http://www.vupen.com/english/advisories/2008/1697 - Permissions Required, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 - Third Party Advisory, VDB Entry
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 - Broken Link
References () https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html - () https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html - Third Party Advisory

Information

Published : 2007-09-14 00:17

Updated : 2024-01-19 15:13


NVD link : CVE-2007-4465

Mitre link : CVE-2007-4465

CVE.ORG link : CVE-2007-4465


JSON object : View

Products Affected

apache

  • http_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')