6.8
CVSSv2

CVE-2002-0840

Published: 11/10/2002 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 prior to 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote malicious users to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

oracle application server 9.0.2.1

apache http server 1.3.23

oracle oracle9i 9.0.1

oracle oracle9i 9.0.2

oracle oracle8i 8.1.7_.0.0_enterprise

oracle database server 8.1.7

apache http server 2.0.35

apache http server 2.0.37

apache http server 1.3.1

apache http server 1.3.25

oracle oracle9i 9.0

apache http server 1.3.19

oracle database server 9.2.1

apache http server 2.0.39

apache http server 1.3.24

oracle application server 9.0.2

apache http server 1.3.20

apache http server 1.3.6

apache http server 2.0.41

oracle oracle8i 8.1.7.1

oracle oracle8i 8.1.7

apache http server 1.3.4

oracle oracle8i 8.1.7_.1.0_enterprise

apache http server 1.3.18

apache http server 2.0.32

oracle oracle9i 9.0.1.3

oracle application server 1.0.2.1s

apache http server 2.0.38

apache http server 1.3

apache http server 1.3.12

apache http server 1.3.3

apache http server 1.3.17

oracle oracle9i 9.0.1.2

apache http server 1.3.26

apache http server 1.3.9

apache http server 2.0.40

apache http server 2.0.36

apache http server 1.3.14

apache http server 1.3.22

apache http server 1.3.11

oracle application server 1.0.2.2

apache http server 2.0.28

oracle database server 9.2.2

apache http server 2.0

oracle application server 1.0.2

Vendor Advisories

According to David Wagner, iDEFENSE and the Apache HTTP Server Project, several vulnerabilities have been found in the Apache server package, a commonly used webserver Most of the code is shared between the Apache and Apache-Perl packages, so vulnerabilities are shared as well These vulnerabilities could allow an attacker to enact a denial of ser ...
According to David Wagner, iDEFENSE and the Apache HTTP Server Project, several vulnerabilities have been found in the Apache package, a commonly used webserver Most of the code is shared between the Apache and Apache-SSL packages, so vulnerabilities are shared as well These vulnerabilities could allow an attacker to enact a denial of service aga ...

Exploits

source: wwwsecurityfocuscom/bid/5847/info Apache is reported to be vulnerable to cross site scripting attacks This vulnerability is due to the SSI error pages of the webserver not being properly sanitized of malicious HTML code Attacker-supplied HTML and script code may be executed on a web client visiting the malicious link in the con ...

References

NVD-CWE-Otherhttp://www.apacheweek.com/issues/02-10-04http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0003.htmlhttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530http://www.linuxsecurity.com/advisories/other_advisory-2414.htmlhttp://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.phphttp://www.debian.org/security/2002/dsa-187http://www.debian.org/security/2002/dsa-188http://www.debian.org/security/2002/dsa-195http://online.securityfocus.com/advisories/4617http://archives.neohapsis.com/archives/bugtraq/2002-10/0254.htmlhttp://www.redhat.com/support/errata/RHSA-2002-222.htmlhttp://www.redhat.com/support/errata/RHSA-2002-243.htmlhttp://www.redhat.com/support/errata/RHSA-2002-244.htmlhttp://www.redhat.com/support/errata/RHSA-2002-248.htmlhttp://www.redhat.com/support/errata/RHSA-2002-251.htmlhttp://www.redhat.com/support/errata/RHSA-2003-106.htmlftp://patches.sgi.com/support/free/security/advisories/20021105-02-Ihttp://www.kb.cert.org/vuls/id/240329http://www.securityfocus.com/bid/5847http://www.osvdb.org/862http://marc.info/?l=bugtraq&m=103357160425708&w=2http://marc.info/?l=bugtraq&m=103376585508776&w=2http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/10241https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.govhttps://www.debian.org/security/./dsa-195https://www.exploit-db.com/exploits/21885/https://www.kb.cert.org/vuls/id/240329