|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: Apache mod_negotiation Xss and Http Response Splitting | ||
|---|---|---|---|
| Product: | [openSUSE] openSUSE 10.3 | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Security | Assignee: | Sonja Krause-Harder <skh> |
| Status: | RESOLVED WONTFIX | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Major | ||
| Priority: | P5 - None | CC: | meissner, security-team |
| Version: | Final | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | CVE-2008-0456: CVSS v2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 355888 | ||
| Deadline: | 2008-02-20 | ||
| Attachments: | CVE-2008-0456.diff | ||
|
Description
Ludwig Nussel
2008-01-23 09:09:32 UTC
CVE-2008-0456 Description CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file. References Note: [44]References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. * BUGTRAQ:20080122 Apache mod_negotiation Xss and Http Response Splitting * [45]URL:http://www.securityfocus.com/archive/1/archive/1/486847/100/0/threaded * [46]MISC:http://www.mindedsecurity.com/MSA01150108.html * BID:27409 * [47]URL:http://www.securityfocus.com/bid/27409 * SECTRACK:1019256 * [48]URL:http://securitytracker.com/id?1019256 * XF:apache-modnegotiation-response-splitting(39893) * [49]URL:http://xforce.iss.net/xforce/xfdb/39893 Tracked in bug #355888 Hm, or not... This is not considered a security issue by the apache project, see http://marc.info/?l=apache-httpd-dev&m=120222445311334&w=2 Please reopen if you disagree. CVE-2008-0455 Description Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file. References Note: [44]References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete. * BUGTRAQ:20080122 Apache mod_negotiation Xss and Http Response Splitting * [45]URL:http://www.securityfocus.com/archive/1/archive/1/486847/100/0/threaded * [46]MISC:http://www.mindedsecurity.com/MSA01150108.html * BID:27409 * [47]URL:http://www.securityfocus.com/bid/27409 * SECTRACK:1019256 * [48]URL:http://securitytracker.com/id?1019256 * XF:apache-modnegotiation-xss(39867) * [49]URL:http://xforce.iss.net/xforce/xfdb/39867 CVE-2008-0456: CVSS v2 Base Score: 2.6 (AV:N/AC:H/Au:N/C:N/I:P/A:N) added note to cve db apparently was fixed in 2.2.12:
Changes with Apache 2.2.12
...
*) mod_negotiation: Escape pathes of filenames in 406 responses to avoid
HTML injections and HTTP response splitting. PR 46837.
[Geoff Keating <geoffk apple.com>]
So this is fixed for SLE11 SP1 now.
Created attachment 467362 [details]
CVE-2008-0456.diff
from apache bugtracker
|