CVE-2007-4465
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
14/09/2007
Last modified:
23/04/2026
Description
Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.0.0 (including) | 2.0.61 (excluding) |
| cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.2.0 (including) | 2.2.6 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.gentoo.org/show_bug.cgi?id=186219
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/26842
- http://secunia.com/advisories/26952
- http://secunia.com/advisories/27563
- http://secunia.com/advisories/27732
- http://secunia.com/advisories/28467
- http://secunia.com/advisories/28471
- http://secunia.com/advisories/28607
- http://secunia.com/advisories/28749
- http://secunia.com/advisories/30430
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/35650
- http://security.gentoo.org/glsa/glsa-200711-06.xml
- http://securityreason.com/achievement_securityalert/46
- http://securityreason.com/securityalert/3113
- http://securitytracker.com/id?1019194
- http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm
- http://www.apache.org/dist/httpd/CHANGES_2.2.6
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:014
- http://www.novell.com/linux/security/advisories/2007_61_apache2.html
- http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
- http://www.redhat.com/support/errata/RHSA-2007-0911.html
- http://www.redhat.com/support/errata/RHSA-2008-0004.html
- http://www.redhat.com/support/errata/RHSA-2008-0005.html
- http://www.redhat.com/support/errata/RHSA-2008-0006.html
- http://www.redhat.com/support/errata/RHSA-2008-0008.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.securityfocus.com/archive/1/479237/100/0/threaded
- http://www.securityfocus.com/bid/25653
- http://www.ubuntu.com/usn/usn-575-1
- http://www.us-cert.gov/cas/techalerts/TA08-150A.html
- http://www.vupen.com/english/advisories/2008/1697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html
- http://bugs.gentoo.org/show_bug.cgi?id=186219
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/26842
- http://secunia.com/advisories/26952
- http://secunia.com/advisories/27563
- http://secunia.com/advisories/27732
- http://secunia.com/advisories/28467
- http://secunia.com/advisories/28471
- http://secunia.com/advisories/28607
- http://secunia.com/advisories/28749
- http://secunia.com/advisories/30430
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/35650
- http://security.gentoo.org/glsa/glsa-200711-06.xml
- http://securityreason.com/achievement_securityalert/46
- http://securityreason.com/securityalert/3113
- http://securitytracker.com/id?1019194
- http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm
- http://www.apache.org/dist/httpd/CHANGES_2.2.6
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:014
- http://www.novell.com/linux/security/advisories/2007_61_apache2.html
- http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
- http://www.redhat.com/support/errata/RHSA-2007-0911.html
- http://www.redhat.com/support/errata/RHSA-2008-0004.html
- http://www.redhat.com/support/errata/RHSA-2008-0005.html
- http://www.redhat.com/support/errata/RHSA-2008-0006.html
- http://www.redhat.com/support/errata/RHSA-2008-0008.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.securityfocus.com/archive/1/479237/100/0/threaded
- http://www.securityfocus.com/bid/25653
- http://www.ubuntu.com/usn/usn-575-1
- http://www.us-cert.gov/cas/techalerts/TA08-150A.html
- http://www.vupen.com/english/advisories/2008/1697
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36586
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html



