4.3
CVSSv2

CVE-2006-5752

Published: 27/06/2007 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

canonical ubuntu linux 7.04

canonical ubuntu linux 6.10

canonical ubuntu linux 6.06

fedoraproject fedora 7

redhat enterprise linux server 5.0

redhat enterprise linux desktop 3.0

redhat enterprise linux workstation 5.0

redhat enterprise linux desktop 4.0

redhat enterprise linux desktop 5.0

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

redhat enterprise linux workstation 3.0

redhat enterprise linux server 3.0

redhat enterprise linux eus 4.5

Vendor Advisories

Stefan Esser discovered that mod_status did not force a character set, which could result in browsers becoming vulnerable to XSS attacks when processing the output If a user were tricked into viewing server status output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such ...

References

NVD-CWE-Otherhttp://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112http://svn.apache.org/viewvc?view=rev&revision=549159http://www.redhat.com/support/errata/RHSA-2007-0532.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0534.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0556.htmlhttp://www.securityfocus.com/bid/24645https://issues.rpath.com/browse/RPL-1500http://httpd.apache.org/security/vulnerabilities_13.htmlhttp://httpd.apache.org/security/vulnerabilities_20.htmlhttp://httpd.apache.org/security/vulnerabilities_22.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2007-353.htmhttp://bugs.gentoo.org/show_bug.cgi?id=186219http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=onlyhttp://www-1.ibm.com/support/docview.wss?uid=swg1PK52702http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.htmlhttp://security.gentoo.org/glsa/glsa-200711-06.xmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:140http://www.mandriva.com/security/advisories?name=MDKSA-2007:141http://www.mandriva.com/security/advisories?name=MDKSA-2007:142https://rhn.redhat.com/errata/RHSA-2007-0533.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0557.htmlhttp://www.novell.com/linux/security/advisories/2007_61_apache2.htmlhttp://www.trustix.org/errata/2007/0026/http://www.ubuntu.com/usn/usn-499-1http://www.securitytracker.com/id?1018302http://secunia.com/advisories/25827http://secunia.com/advisories/25830http://secunia.com/advisories/25873http://secunia.com/advisories/25920http://secunia.com/advisories/26273http://secunia.com/advisories/26443http://secunia.com/advisories/26458http://secunia.com/advisories/26508http://secunia.com/advisories/26822http://secunia.com/advisories/26842http://secunia.com/advisories/26993http://secunia.com/advisories/27037http://secunia.com/advisories/27563http://secunia.com/advisories/27732http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1http://secunia.com/advisories/28212http://secunia.com/advisories/28224http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.htmlhttp://secunia.com/advisories/28606http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1http://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://lists.vmware.com/pipermail/security-announce/2009/000062.htmlhttp://www.vupen.com/english/advisories/2008/0233http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795http://www.vupen.com/english/advisories/2007/4305http://www.vupen.com/english/advisories/2007/2727http://www.vupen.com/english/advisories/2007/3283http://www.vupen.com/english/advisories/2007/3386http://osvdb.org/37052http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/35097https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10154http://www.securityfocus.com/archive/1/505990/100/0/threadedhttps://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3Ehttps://usn.ubuntu.com/499-1/https://nvd.nist.gov