// For flags

CVE-2007-4465

mod_autoindex XSS

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.

Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en mod_autoindex.c en el servidor HTTP Apache versiones anteriores a 2.2.6, cuando un juego de caracteres en una página generada por el servidor no está definido, permite a atacantes remotos inyectar scripts web o HTML de su elección a través del parámetro P utilizando el juego de caracteres UTF-7.
NOTA. Se podría argumentar que este asunto se debe a una limitación de diseño de los navegadores que intentan realizar una detección automática de tipo de contenido.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-08-21 CVE Reserved
  • 2007-09-13 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (43)
URL Tag Source
http://bugs.gentoo.org/show_bug.cgi?id=186219 Third Party Advisory
http://secunia.com/advisories/26842 Broken Link
http://secunia.com/advisories/26952 Broken Link
http://secunia.com/advisories/27563 Broken Link
http://secunia.com/advisories/27732 Broken Link
http://secunia.com/advisories/28467 Broken Link
http://secunia.com/advisories/28471 Broken Link
http://secunia.com/advisories/28607 Broken Link
http://secunia.com/advisories/28749 Broken Link
http://secunia.com/advisories/30430 Broken Link
http://secunia.com/advisories/31651 Broken Link
http://secunia.com/advisories/33105 Broken Link
http://secunia.com/advisories/35650 Broken Link
http://securityreason.com/achievement_securityalert/46 Third Party Advisory
http://securityreason.com/securityalert/3113 Third Party Advisory
http://securitytracker.com/id?1019194 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2008-032.htm Third Party Advisory
http://www.apache.org/dist/httpd/CHANGES_2.2.6 Broken Link
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html Third Party Advisory
http://www.securityfocus.com/archive/1/479237/100/0/threaded Broken Link
http://www.us-cert.gov/cas/techalerts/TA08-150A.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36586 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10929 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6089 Broken Link
URL Date SRC
URL Date SRC
http://www.securityfocus.com/bid/25653 2024-01-19
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.0.0 < 2.0.61
Search vendor "Apache" for product "Http Server" and version " >= 2.0.0 < 2.0.61"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
>= 2.2.0 < 2.2.6
Search vendor "Apache" for product "Http Server" and version " >= 2.2.0 < 2.2.6"
-
Affected