This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.
The remote web server may be affected by one or more issues.
According to its self-reported banner, the version of Apache on the
remote host does not properly escape filenames in 406 responses. A
remote attacker might be able to leverage this to inject arbitrary
HTTP headers or conduct cross-site scripting attacks by uploading a
file with a specially crafted name.
Note that the remote web server may not actually be affected by these
vulnerabilities as Nessus has relied solely on the version number in
the server's banner.
See also :
Apply the workaround referenced above or upgrade to Apache 2.3.2.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true