4.3
CVSSv2

CVE-2007-6203

Published: 03/12/2007 Updated: 15/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.51

apache http server 2.0.52

apache http server 2.1.2

apache http server 2.1.3

apache http server 2.2.2

apache http server 2.2.3

apache http server 2.0.46

apache http server 2.0.53

apache http server 2.0.54

apache http server 2.0.55

apache http server 2.1.4

apache http server 2.1.5

apache http server 2.2.4

apache http server 2.0.47

apache http server 2.0.48

apache http server 2.0.57

apache http server 2.0.58

apache http server 2.1.6

apache http server 2.1.7

apache http server 2.0.49

apache http server 2.0.50

apache http server 2.0.59

apache http server 2.1.1

apache http server 2.1.8

apache http server 2.2.0

Vendor Advisories

It was discovered that Apache did not sanitize the method specifier header from an HTTP request when it is returned in an error message, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output With cross-site scripting vulnerabilities, if a user were tricked into viewing server output durin ...
Debian Bug report logs - #453783 apache2: CVE-2007-4465 Package: apache2; Maintainer for apache2 is Debian Apache Maintainers <debian-apache@listsdebianorg>; Source for apache2 is src:apache2 (PTS, buildd, popcon) Reported by: Paul Szabo <psz@mathsusydeduau> Date: Sat, 1 Dec 2007 08:39:01 UTC Severity: importa ...

Exploits

source: wwwsecurityfocuscom/bid/26663/info Apache is prone to a cross-site scripting weakness when handling HTTP request methods that result in 413 HTTP errors An attacker may exploit this issue to steal cookie-based authentication credentials and launch other attacks Apache 2046 through 224 are vulnerable; other versions may also ...

Github Repositories

Strike A python tool to quickly analyze all IPs and see which ones have open ports and vulnerabilities Installation apt-get install python3 git clone githubcom/SecureAxom/strike cd strike pip3 install -r requirementstxt python3 strikepy Usages python3 strikepy -h python3 strikepy -t 20891

References

CWE-79http://procheckup.com/Vulnerability_PR07-37.phphttp://www.securityfocus.com/bid/26663http://secunia.com/advisories/27906http://www.securitytracker.com/id?1019030http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952http://secunia.com/advisories/28196http://security.gentoo.org/glsa/glsa-200803-19.xmlhttp://secunia.com/advisories/29348http://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://securityreason.com/securityalert/3411http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.htmlhttp://secunia.com/advisories/29640http://www-1.ibm.com/support/docview.wss?uid=swg24019245http://secunia.com/advisories/30356http://secunia.com/advisories/30732http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.htmlhttp://secunia.com/advisories/33105http://www.ubuntu.com/usn/USN-731-1http://secunia.com/advisories/34219http://marc.info/?l=bugtraq&m=125631037611762&w=2http://marc.info/?l=bugtraq&m=129190899612998&w=2http://www.vupen.com/english/advisories/2007/4301http://www.vupen.com/english/advisories/2007/4060http://www.vupen.com/english/advisories/2008/1623/referenceshttp://www.vupen.com/english/advisories/2008/0924/referenceshttp://www.vupen.com/english/advisories/2008/1875/referenceshttps://exchange.xforce.ibmcloud.com/vulnerabilities/38800https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12166http://www.securityfocus.com/archive/1/484410/100/0/threadedhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/30835/https://usn.ubuntu.com/731-1/