Apache mod_negotiation Multi-Line Filename Upload Vulnerabilities

medium Nessus Plugin ID 17692

Synopsis

The remote web server may be affected by one or more issues.

Description

According to its banner, the version of Apache running on the remote host does not properly escape filenames in 406 responses. A remote attacker can exploit this to inject arbitrary HTTP headers or conduct cross-site scripting attacks by uploading a file with a specially crafted name.

Note that the remote web server may not actually be affected by these vulnerabilities as Nessus has relied solely on the version number in the server's banner.

Solution

Upgrade to Apache 2.3.2 or later. Alternatively, apply the workaround referenced in the vendor advisory.

See Also

https://www.securityfocus.com/archive/1/486847/100/0/threaded

https://bz.apache.org/bugzilla/show_bug.cgi?id=46837

http://www.nessus.org/u?164dd6e5

Plugin Details

Severity: Medium

ID: 17692

File Name: apache_mod_negotiation_xss.nasl

Version: 1.14

Type: remote

Family: Web Servers

Published: 11/18/2011

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache, Settings/PCI_DSS

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1/22/2008

Reference Information

CVE: CVE-2008-0455, CVE-2008-0456

BID: 27409

CWE: 79, 94