4.3
CVSSv2

CVE-2007-5000

Published: 13/12/2007 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 up to and including 1.3.39 and 2.0.35 up to and including 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 up to and including 2.2.6 allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

fedoraproject fedora 8

fedoraproject fedora 7

canonical ubuntu linux 7.04

canonical ubuntu linux 7.10

canonical ubuntu linux 6.10

canonical ubuntu linux 6.06

opensuse opensuse 10.2

suse linux enterprise server 9

opensuse opensuse 10.3

suse linux enterprise server 10

suse linux enterprise desktop 9

oracle http server 10.1.3.5.0

Vendor Advisories

It was discovered that Apache did not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a craf ...
Debian Bug report logs - #453783 apache2: CVE-2007-4465 Package: apache2; Maintainer for apache2 is Debian Apache Maintainers <debian-apache@listsdebianorg>; Source for apache2 is src:apache2 (PTS, buildd, popcon) Reported by: Paul Szabo <psz@mathsusydeduau> Date: Sat, 1 Dec 2007 08:39:01 UTC Severity: importa ...

References

CWE-79http://httpd.apache.org/security/vulnerabilities_13.htmlhttp://httpd.apache.org/security/vulnerabilities_20.htmlhttp://httpd.apache.org/security/vulnerabilities_22.htmlhttp://secunia.com/advisories/28046http://secunia.com/advisories/28073http://www-1.ibm.com/support/docview.wss?uid=swg1PK58024http://www.securityfocus.com/bid/26838http://securitytracker.com/id?1019093http://secunia.com/advisories/28081http://secunia.com/advisories/28196http://www-1.ibm.com/support/docview.wss?uid=swg1PK58074http://secunia.com/advisories/28375http://www.mandriva.com/security/advisories?name=MDVSA-2008:014http://www.mandriva.com/security/advisories?name=MDVSA-2008:015http://www.redhat.com/support/errata/RHSA-2008-0004.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0005.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0006.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0007.htmlhttp://www.redhat.com/support/errata/RHSA-2008-0008.htmlhttp://secunia.com/advisories/28467http://secunia.com/advisories/28471http://www.fujitsu.com/global/support/software/security/products-f/interstage-200801e.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2008:016http://secunia.com/advisories/28525http://secunia.com/advisories/28526http://support.avaya.com/elmodocs2/security/ASA-2008-032.htmhttp://secunia.com/advisories/28607http://www.ubuntu.com/usn/usn-575-1http://secunia.com/advisories/28749http://secunia.com/advisories/28750http://www.osvdb.org/39134https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.htmlhttp://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748http://secunia.com/advisories/28977http://secunia.com/advisories/28922http://sunsolve.sun.com/search/document.do?assetkey=1-26-233623-1http://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.htmlhttp://secunia.com/advisories/29640http://www-1.ibm.com/support/docview.wss?uid=swg1PK63273http://secunia.com/advisories/29806http://www.redhat.com/support/errata/RHSA-2008-0009.htmlhttp://secunia.com/advisories/29988http://www-1.ibm.com/support/docview.wss?uid=swg24019245http://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://secunia.com/advisories/30356http://lists.apple.com/archives/security-announce/2008//May/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA08-150A.htmlhttp://secunia.com/advisories/30430http://secunia.com/advisories/31142http://secunia.com/advisories/30732http://lists.vmware.com/pipermail/security-announce/2009/000062.htmlhttp://www.vupen.com/english/advisories/2008/0178http://www.vupen.com/english/advisories/2007/4202http://www.vupen.com/english/advisories/2008/1697http://www.vupen.com/english/advisories/2007/4301http://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2008/0809/referenceshttp://www.vupen.com/english/advisories/2008/1224/referenceshttp://www.vupen.com/english/advisories/2007/4201http://www.vupen.com/english/advisories/2008/1623/referenceshttp://www.vupen.com/english/advisories/2008/0084http://www.vupen.com/english/advisories/2008/0398http://www.vupen.com/english/advisories/2008/1875/referenceshttp://marc.info/?l=bugtraq&m=130497311408250&w=2http://secunia.com/advisories/32800http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.htmlhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501https://exchange.xforce.ibmcloud.com/vulnerabilities/39002https://exchange.xforce.ibmcloud.com/vulnerabilities/39001https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9539http://www.securityfocus.com/archive/1/505990/100/0/threadedhttp://www.securityfocus.com/archive/1/498523/100/0/threadedhttp://www.securityfocus.com/archive/1/494428/100/0/threadedhttps://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3Ehttps://usn.ubuntu.com/575-1/https://nvd.nist.gov