This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.
The remote web server may be affected by one or more issues.
According to its self-reported banner, the version of Apache on the
remote host does not properly escape filenames in 406 responses. A
remote attacker might be able to leverage this to inject arbitrary
HTTP headers or conduct cross-site scripting attacks by uploading a
file with a specially crafted name.
Note that the remote web server may not actually be affected by these
vulnerabilities as Nessus has relied solely on the version number in
the server's banner.
See also :
Apply the workaround referenced above or upgrade to Apache 2.3.2.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 17692 ()
Bugtraq ID: 27409
CVE ID: CVE-2008-0455CVE-2008-0456
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.