Vulnerabilidad en Apache (CVE-2008-2168)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-79
Neutralización incorrecta de la entrada durante la generación de la página web (Cross-site Scripting)
Fecha de publicación:
13/05/2008
Última modificación:
09/04/2025
Descripción
La vulnerabilidad de tipo cross-site-scripting (XSS) en Apache versión 2.2.6 y anteriores, permite a los atacantes remotos inyectar scripts web o HTML arbitrarios por medio de direcciones URL codificadas UTF-7 que no se manejan apropiadamente cuando se muestra la página de error 403 Forbidden .
Impacto
Puntuación base 2.0
4.30
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* | ||
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/34219
- http://secunia.com/advisories/35650
- http://securityreason.com/securityalert/3889
- http://www.securityfocus.com/archive/1/491862/100/0/threaded
- http://www.securityfocus.com/archive/1/491901/100/0/threaded
- http://www.securityfocus.com/archive/1/491930/100/0/threaded
- http://www.securityfocus.com/archive/1/491967/100/0/threaded
- http://www.securityfocus.com/bid/29112
- http://www.ubuntu.com/usn/USN-731-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42303
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5143
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01539432
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://secunia.com/advisories/31651
- http://secunia.com/advisories/34219
- http://secunia.com/advisories/35650
- http://securityreason.com/securityalert/3889
- http://www.securityfocus.com/archive/1/491862/100/0/threaded
- http://www.securityfocus.com/archive/1/491901/100/0/threaded
- http://www.securityfocus.com/archive/1/491930/100/0/threaded
- http://www.securityfocus.com/archive/1/491967/100/0/threaded
- http://www.securityfocus.com/bid/29112
- http://www.ubuntu.com/usn/USN-731-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42303
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5143