// For flags

CVE-2007-4465

mod_autoindex XSS

Severity Score

6.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.

Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mod_autoindex.c en el servidor HTTP Apache versiones anteriores a 2.2.6, cuando un juego de caracteres en una página generada por el servidor no está definido, permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro P utilizando el juego de caracteres UTF-7. NOTA. Se podría argumentar que este asunto se debe a una limitación de diseño de los navegadores que intentan realizar una detección automática de tipo de contenido.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2007-08-21 CVE Reserved
  • 2007-09-14 CVE Published
  • 2025-01-17 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (43)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=186219 Third Party Advisory
http://secunia.com/advisories/26842 Broken Link
http://secunia.com/advisories/26952 Broken Link
http://secunia.com/advisories/27563 Broken Link
http://secunia.com/advisories/27732 Broken Link
http://secunia.com/advisories/28467 Broken Link
http://secunia.com/advisories/28471 Broken Link
http://secunia.com/advisories/28607 Broken Link
http://secunia.com/advisories/28749 Broken Link
http://secunia.com/advisories/30430 Broken Link
http://secunia.com/advisories/31651 Broken Link
http://secunia.com/advisories/33105 Broken Link
http://secunia.com/advisories/35650 Broken Link
http://securityreason.com/achievement_securityalert/46 Third Party Advisory
http://securityreason.com/securityalert/3113 Third Party Advisory
http://securitytracker.com/id?1019194 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm Third Party Advisory
http://www.apache.org/dist/httpd/CHANGES_2.2.6 Broken Link
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html Third Party Advisory
http://www.securityfocus.com/archive/1/479237/100/0/threaded Broken Link
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 Broken Link
URL Date SRC
URL Date SRC
http://www.securityfocus.com/bid/25653 2024-01-19
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.0.0 < 2.0.61
Search vendor "Apache" for product "Http Server" and version " >= 2.0.0 < 2.0.61"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.2.0 < 2.2.6
Search vendor "Apache" for product "Http Server" and version " >= 2.2.0 < 2.2.6"
-
Affected