CVE-2008-2939

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.

References

http://svn.apache.org/viewvc?view=rev&revision=682868

http://svn.apache.org/viewvc?view=rev&revision=682871

http://www.securityfocus.com/bid/30560

http://secunia.com/advisories/31384

http://www.rapid7.com/advisories/R7-0033

http://secunia.com/advisories/31673

http://www.kb.cert.org/vuls/id/663763

http://www.securitytracker.com/id?1020635

http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197

http://svn.apache.org/viewvc?view=rev&revision=682870

http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937

http://www.mandriva.com/security/advisories?name=MDVSA-2008:195

http://www.mandriva.com/security/advisories?name=MDVSA-2008:194

http://secunia.com/advisories/32685

http://rhn.redhat.com/errata/RHSA-2008-0967.html

http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html

http://www.redhat.com/support/errata/RHSA-2008-0966.html

http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1

http://secunia.com/advisories/33156

http://marc.info/?l=bugtraq&m=123376588623823&w=2

http://secunia.com/advisories/33797

http://secunia.com/advisories/32838

http://wiki.rpath.com/Advisories:rPSA-2008-0327

http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328

http://www.ubuntu.com/usn/USN-731-1

http://secunia.com/advisories/34219

http://lists.apple.com/archives/security-announce/2009/May/msg00002.html

http://support.apple.com/kb/HT3549

http://www.us-cert.gov/cas/techalerts/TA09-133A.html

http://secunia.com/advisories/35074

http://www.vupen.com/english/advisories/2009/1297

http://www.mandriva.com/security/advisories?name=MDVSA-2009:124

http://marc.info/?l=bugtraq&m=125631037611762&w=2

http://www.vupen.com/english/advisories/2009/0320

http://www.vupen.com/english/advisories/2008/2315

http://www.vupen.com/english/advisories/2008/2461

https://exchange.xforce.ibmcloud.com/vulnerabilities/44223

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7716

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11316

http://www.securityfocus.com/archive/1/498567/100/0/threaded

http://www.securityfocus.com/archive/1/498566/100/0/threaded

http://www.securityfocus.com/archive/1/495180/100/0/threaded

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2008-08-06

Updated: 2021-06-06

Type: CWE-79

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
67760Oracle Linux 3 / 4 / 5 : httpd (ELSA-2008-0967)NessusOracle Linux Local Security Checks
medium
60493Scientific Linux Security Update : httpd on SL3.x, SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
50069Apache 2.0.x < 2.0.64 Multiple VulnerabilitiesNessusWeb Servers
high
43042Mandriva Linux Security Advisory : apache (MDVSA-2009:323)NessusMandriva Local Security Checks
high
41245SuSE9 Security Update : Apache 2 (YOU Patch Number 12258)NessusSuSE Local Security Checks
medium
39910openSUSE Security Update : apache2 (apache2-222)NessusSuSE Local Security Checks
medium
39761Mandriva Linux Security Advisory : apache (MDVSA-2009:124-1)NessusMandriva Local Security Checks
medium
38744Mac OS X 10.5.x < 10.5.7 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
38743Mac OS X Multiple Vulnerabilities (Security Update 2009-002)NessusMacOS X Local Security Checks
critical
37114Mandriva Linux Security Advisory : apache (MDVSA-2008:195)NessusMandriva Local Security Checks
medium
37062CentOS 3 / 4 / 5 : httpd (CESA-2008:0967)NessusCentOS Local Security Checks
medium
36589Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : apache2 vulnerabilities (USN-731-1)NessusUbuntu Local Security Checks
medium
35911FreeBSD : apache -- XSS vulnerability (f1892066-0e74-11de-92de-000bcdc1757a)NessusFreeBSD Local Security Checks
medium
34779SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 5767)NessusSuSE Local Security Checks
medium
34751RHEL 3 / 4 / 5 : httpd (RHSA-2008:0967)NessusRed Hat Local Security Checks
medium
34699openSUSE 10 Security Update : apache2 (apache2-5648)NessusSuSE Local Security Checks
medium
34698SuSE 10 Security Update : Apache 2 (ZYPP Patch Number 5629)NessusSuSE Local Security Checks
medium
34697openSUSE 10 Security Update : apache2 (apache2-5628)NessusSuSE Local Security Checks
medium
4712Apache < 2.2.10 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
34433Apache mod_proxy_ftp Directory Component Wildcard Character Globbing XSSNessusWeb Servers
medium
5023Mac OS X 10.5 < 10.5.7 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
800792Mac OS X 10.5 < 10.5.7 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high