Skip to navigation

CVE Database

CVE-2008-0455

Impact: Low
Public: 2012-06-13
Bugzilla: 850794: CVE-2012-2687 CVE-2008-0455 httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled

Details

The MITRE CVE dictionary describes this issue as:

Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

Find out more about CVE-2008-0455 from the MITRE CVE dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

Base Score: 2.6
Base Metrics: AV:N/AC:H/Au:N/C:N/I:P/A:N
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
Red Hat Enterprise Linux version 5 (httpd) RHSA-2013:0130 January 08, 2013
Red Hat Enterprise Linux version 6 (httpd) RHSA-2013:0512 February 20, 2013
Red Hat JBoss Enterprise Application Platform 6 for RHEL 5 Server RHSA-2012:1591 December 18, 2012
Red Hat JBoss Enterprise Application Platform 6 for RHEL 6 Server RHSA-2012:1592 December 18, 2012
Red Hat JBoss Enterprise Application Platform 6.0 RHSA-2012:1594 December 18, 2012

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.