Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-0456

Опубликовано: 25 янв. 2008
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.6

Описание

CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

РелизСтатусПримечание
dapper

ignored

devel

DNE

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

DNE

hardy

DNE

intrepid

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

ignored

devel

not-affected

edgy

ignored

end of life, was needed
feisty

ignored

end of life, was needed
gutsy

ignored

hardy

not-affected

intrepid

not-affected

upstream

needed

Показывать по

Ссылки на источники

EPSS

Процентиль: 91%
0.07575
Низкий

2.6 Low

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

nvd
почти 18 лет назад

CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

debian
почти 18 лет назад

CRLF injection vulnerability in the mod_negotiation module in the Apac ...

github
больше 3 лет назад

CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

oracle-oval
почти 13 лет назад

ELSA-2013-0130: httpd security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 91%
0.07575
Низкий

2.6 Low

CVSS2