CVE-2007-4465
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
14/09/2007
Última modificación:
09/04/2025
Descripción
Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mod_autoindex.c en el servidor HTTP Apache versiones anteriores a 2.2.6, cuando un juego de caracteres en una página generada por el servidor no está definido, permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro P utilizando el juego de caracteres UTF-7.<br />
NOTA. Se podría argumentar que este asunto se debe a una limitación de diseño de los navegadores que intentan realizar una detección automática de tipo de contenido.
Impacto
Puntuación base 3.x
6.10
Gravedad 3.x
MEDIA
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.0.0 (incluyendo) | 2.0.61 (excluyendo) |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.2.0 (incluyendo) | 2.2.6 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://bugs.gentoo.org/show_bug.cgi?id=186219
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/26842
- http://secunia.com/advisories/26952
- http://secunia.com/advisories/27563
- http://secunia.com/advisories/27732
- http://secunia.com/advisories/28467
- http://secunia.com/advisories/28471
- http://secunia.com/advisories/28607
- http://secunia.com/advisories/28749
- http://secunia.com/advisories/30430
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/35650
- http://security.gentoo.org/glsa/glsa-200711-06.xml
- http://securityreason.com/achievement_securityalert/46
- http://securityreason.com/securityalert/3113
- http://securitytracker.com/id?1019194=
- http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm
- http://www.apache.org/dist/httpd/CHANGES_2.2.6
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A014
- http://www.novell.com/linux/security/advisories/2007_61_apache2.html
- http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
- http://www.redhat.com/support/errata/RHSA-2007-0911.html
- http://www.redhat.com/support/errata/RHSA-2008-0004.html
- http://www.redhat.com/support/errata/RHSA-2008-0005.html
- http://www.redhat.com/support/errata/RHSA-2008-0006.html
- http://www.redhat.com/support/errata/RHSA-2008-0008.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.securityfocus.com/archive/1/479237/100/0/threaded
- http://www.securityfocus.com/bid/25653
- http://www.ubuntu.com/usn/usn-575-1
- http://www.us-cert.gov/cas/techalerts/TA08-150A.html
- http://www.vupen.com/english/advisories/2008/1697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html
- http://bugs.gentoo.org/show_bug.cgi?id=186219
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/26842
- http://secunia.com/advisories/26952
- http://secunia.com/advisories/27563
- http://secunia.com/advisories/27732
- http://secunia.com/advisories/28467
- http://secunia.com/advisories/28471
- http://secunia.com/advisories/28607
- http://secunia.com/advisories/28749
- http://secunia.com/advisories/30430
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/35650
- http://security.gentoo.org/glsa/glsa-200711-06.xml
- http://securityreason.com/achievement_securityalert/46
- http://securityreason.com/securityalert/3113
- http://securitytracker.com/id?1019194=
- http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm
- http://www.apache.org/dist/httpd/CHANGES_2.2.6
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A014
- http://www.novell.com/linux/security/advisories/2007_61_apache2.html
- http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
- http://www.redhat.com/support/errata/RHSA-2007-0911.html
- http://www.redhat.com/support/errata/RHSA-2008-0004.html
- http://www.redhat.com/support/errata/RHSA-2008-0005.html
- http://www.redhat.com/support/errata/RHSA-2008-0006.html
- http://www.redhat.com/support/errata/RHSA-2008-0008.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.securityfocus.com/archive/1/479237/100/0/threaded
- http://www.securityfocus.com/bid/25653
- http://www.ubuntu.com/usn/usn-575-1
- http://www.us-cert.gov/cas/techalerts/TA08-150A.html
- http://www.vupen.com/english/advisories/2008/1697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html