Apache < 1.3.31 / 2.0.49 Log Entry Terminal Escape Sequence Injection

medium Nessus Plugin ID 12239

Language:

Synopsis

The remote web server is affected by a log injection vulnerability.

Description

The target is running an Apache web server that allows for the injection of arbitrary escape sequences into its error logs. An attacker might use this vulnerability in an attempt to exploit similar vulnerabilities in terminal emulators.

***** Nessus has determined the vulnerability exists only by looking at ***** the Server header returned by the web server running on the target.

Solution

Upgrade to Apache version 1.3.31 or 2.0.49 or later.

Plugin Details

Severity: Medium

ID: 12239

File Name: apache_log_injection.nasl

Version: 1.34

Type: remote

Family: Web Servers

Published: 5/17/2004

Updated: 8/15/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: www/apache, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/24/2003

Reference Information

CVE: CVE-2003-0020

BID: 9930

APPLE-SA: APPLE-SA-2004-05-03

CLSA: CLSA-2004

HPSB: HPSBUX01022

MDKSA: MDKSA-2003

OPENPKG-SA: OpenPKG-SA-2004.021-apache

RHSA: 2003:082, 2003:083, 2003:104, 2003:139, 2003:243, 2003:244

SECUNIA: 11681, 11705, 11719, 11859, 12246

SSA: SSA

SuSE: SuSE-SA

TLSA: TLSA-2004-11

TSLSA: TSLSA-2004-0017