Apache mod_ssl Host: Header XSS

medium Nessus Plugin ID 11622

Language:

Synopsis

The remote web server module has a cross-site scripting vulnerability.

Description

According to the web server banner, the version of mod_ssl running on the remote host has a cross-site scripting vulnerability. A remote attacker could exploit this by tricking a user into requesting a maliciously crafted URL, resulting in stolen credentials.

Note that several Linux distributions (such as RedHat) patched the old version of this module. Therefore, this might be a false positive. Please check with your vendor to determine if you really are affected by this flaw.

Solution

Upgrade to mod_ssl 2.8.10 or later.

See Also

https://seclists.org/bugtraq/2002/Oct/384

Plugin Details

Severity: Medium

ID: 11622

File Name: mod_ssl_wildcard_dns_xss.nasl

Version: 1.27

Type: remote

Published: 5/12/2003

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Required KB Items: Settings/ParanoidReport, www/apache

Exploit Ease: No exploit is required

Vulnerability Publication Date: 10/22/2002

Reference Information

CVE: CVE-2002-1157

BID: 6029

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990