Vulnerabilidad en Apache HTTP Server 2.0.x y 2.2.x (CVE-2007-6203)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
03/12/2007
Última modificación:
09/04/2025
Descripción
Apache HTTP Server 2.0.x y 2.2.x no sanea la cabecera de especificador de HTTP Method de una petición HTTP cuando es reflejada en un error "413 Request Entity Too Large", lo cual podría permitir ataques tipo secuencias de comandos en sitios cruzados (XSS) utilizando componentes de clientes web que pueden enviar cabeceras de su elección en peticiones, como se demuestra con una petición petición HTTP conteniendo un valor inválido de Content-length, asunto similar a CVE-2006-3918.
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=129190899612998&w=2
- http://marc.info/?l=bugtraq&m=129190899612998&w=2
- http://procheckup.com/Vulnerability_PR07-37.php
- http://secunia.com/advisories/27906
- http://secunia.com/advisories/28196
- http://secunia.com/advisories/29348
- http://secunia.com/advisories/29420
- http://secunia.com/advisories/29640
- http://secunia.com/advisories/30356
- http://secunia.com/advisories/30732
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/34219
- http://security.gentoo.org/glsa/glsa-200803-19.xml
- http://securityreason.com/securityalert/3411
- http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952
- http://www-1.ibm.com/support/docview.wss?uid=swg24019245
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.securityfocus.com/archive/1/484410/100/0/threaded
- http://www.securityfocus.com/bid/26663
- http://www.securitytracker.com/id?1019030=
- http://www.ubuntu.com/usn/USN-731-1
- http://www.vupen.com/english/advisories/2007/4060
- http://www.vupen.com/english/advisories/2007/4301
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2008/1623/references
- http://www.vupen.com/english/advisories/2008/1875/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38800
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12166
- http://docs.info.apple.com/article.html?artnum=307562
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=129190899612998&w=2
- http://marc.info/?l=bugtraq&m=129190899612998&w=2
- http://procheckup.com/Vulnerability_PR07-37.php
- http://secunia.com/advisories/27906
- http://secunia.com/advisories/28196
- http://secunia.com/advisories/29348
- http://secunia.com/advisories/29420
- http://secunia.com/advisories/29640
- http://secunia.com/advisories/30356
- http://secunia.com/advisories/30732
- http://secunia.com/advisories/33105
- http://secunia.com/advisories/34219
- http://security.gentoo.org/glsa/glsa-200803-19.xml
- http://securityreason.com/securityalert/3411
- http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952
- http://www-1.ibm.com/support/docview.wss?uid=swg24019245
- http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html
- http://www.securityfocus.com/archive/1/484410/100/0/threaded
- http://www.securityfocus.com/bid/26663
- http://www.securitytracker.com/id?1019030=
- http://www.ubuntu.com/usn/USN-731-1
- http://www.vupen.com/english/advisories/2007/4060
- http://www.vupen.com/english/advisories/2007/4301
- http://www.vupen.com/english/advisories/2008/0924/references
- http://www.vupen.com/english/advisories/2008/1623/references
- http://www.vupen.com/english/advisories/2008/1875/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38800
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12166