// For flags

CVE-2005-3352

httpd cross-site scripting flaw in mod_imap

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows remote attackers to inject arbitrary web script or HTML via the Referer when using image maps.

Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el módulo mod_imap de Apache httpd anteriores a 1.3.35-dev y Apache httpd 2.0.x anteriores a 2.0.56-dev permite a atacantes remotos inyectar 'script' web o HTML de su elección mediante el Referente cuando se usan mapas de imágenes.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-10-27 CVE Reserved
  • 2005-12-13 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-11-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (83)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=307562 Broken Link
http://issues.apache.org/bugzilla/show_bug.cgi?id=37874 Issue Tracking
http://secunia.com/advisories/17319 Not Applicable
http://secunia.com/advisories/18008 Not Applicable
http://secunia.com/advisories/18333 Not Applicable
http://secunia.com/advisories/18339 Not Applicable
http://secunia.com/advisories/18340 Not Applicable
http://secunia.com/advisories/18429 Not Applicable
http://secunia.com/advisories/18517 Not Applicable
http://secunia.com/advisories/18526 Not Applicable
http://secunia.com/advisories/18585 Not Applicable
http://secunia.com/advisories/18743 Not Applicable
http://secunia.com/advisories/19012 Not Applicable
http://secunia.com/advisories/20046 Not Applicable
http://secunia.com/advisories/20670 Not Applicable
http://secunia.com/advisories/21744 Not Applicable
http://secunia.com/advisories/22140 Third Party Advisory
http://secunia.com/advisories/22368 Third Party Advisory
http://secunia.com/advisories/22388 Third Party Advisory
http://secunia.com/advisories/22669 Third Party Advisory
http://secunia.com/advisories/23260 Third Party Advisory
http://secunia.com/advisories/25239 Third Party Advisory
http://secunia.com/advisories/29420 Third Party Advisory
http://secunia.com/advisories/29849 Third Party Advisory
http://secunia.com/advisories/30430 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html Third Party Advisory
http://www.securityfocus.com/bid/15834 Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
http://www.vupen.com/english/advisories/2005/2870 Third Party Advisory
http://www.vupen.com/english/advisories/2006/2423 Third Party Advisory
http://www.vupen.com/english/advisories/2006/3995 Third Party Advisory
http://www.vupen.com/english/advisories/2006/4015 Third Party Advisory
http://www.vupen.com/english/advisories/2006/4300 Third Party Advisory
http://www.vupen.com/english/advisories/2006/4868 Third Party Advisory
http://www.vupen.com/english/advisories/2008/0924/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1246/references Third Party Advisory
http://www.vupen.com/english/advisories/2008/1697 Third Party Advisory
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480 Broken Link
URL Date SRC
URL Date SRC
http://securitytracker.com/id?1015344 2024-01-19
URL Date SRC
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U 2024-01-19
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449 2024-01-19
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html 2024-01-19
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html 2024-01-19
http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html 2024-01-19
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html 2024-01-19
http://marc.info/?l=bugtraq&m=130497311408250&w=2 2024-01-19
http://rhn.redhat.com/errata/RHSA-2006-0159.html 2024-01-19
http://rhn.redhat.com/errata/RHSA-2006-0692.html 2024-01-19
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158 2024-01-19
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483 2024-01-19
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1 2024-01-19
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1 2024-01-19
http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only 2024-01-19
http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only 2024-01-19
http://www.debian.org/security/2006/dsa-1167 2024-01-19
http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml 2024-01-19
http://www.novell.com/linux/security/advisories/2006_43_apache.html 2024-01-19
http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt 2024-01-19
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html 2024-01-19
http://www.redhat.com/support/errata/RHSA-2006-0158.html 2024-01-19
http://www.securityfocus.com/archive/1/425399/100/0/threaded 2024-01-19
http://www.securityfocus.com/archive/1/445206/100/0/threaded 2024-01-19
http://www.securityfocus.com/archive/1/450315/100/0/threaded 2024-01-19
http://www.securityfocus.com/archive/1/450321/100/0/threaded 2024-01-19
http://www.trustix.org/errata/2005/0074 2024-01-19
http://www.ubuntulinux.org/usn/usn-241-1 2024-01-19
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007 2024-01-19
https://access.redhat.com/security/cve/CVE-2005-3352 2008-06-30
https://bugzilla.redhat.com/show_bug.cgi?id=430524 2008-06-30
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
< 1.3.35
Search vendor "Apache" for product "Http Server" and version " < 1.3.35"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.0 < 2.0.56
Search vendor "Apache" for product "Http Server" and version " >= 2.0 < 2.0.56"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.2
Search vendor "Apache" for product "Http Server" and version "2.2"
-
Affected