protocol.c in the Apache HTTP Server 2.2.x up to and including 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote malicious users to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server |
||
debian debian linux 5.0 |
||
debian debian linux 7.0 |
||
debian debian linux 6.0 |
||
opensuse opensuse 11.4 |
||
suse linux enterprise software development kit 10 |
||
suse linux enterprise server 10 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat storage 2.0 |
||
redhat enterprise linux eus 6.2 |
||
redhat jboss_enterprise_web_server 1.0.0 |