Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3fxm-xvrj-h77v

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().

Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().

EPSS

Процентиль: 97%
0.38355
Средний

Связанные уязвимости

nvd
больше 22 лет назад

Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().

debian
больше 22 лет назад

Format string vulnerability in certain third party modifications to mo ...

EPSS

Процентиль: 97%
0.38355
Средний