Apache < 1.3.31 / 2.0.49 Log Entry Terminal Escape Sequence Injection

Medium Nessus Plugin ID 12239

Synopsis

The remote web server is affected by a log injection vulnerability.

Description

The target is running an Apache web server that allows for the injection of arbitrary escape sequences into its error logs. An attacker might use this vulnerability in an attempt to exploit similar vulnerabilities in terminal emulators.

***** Nessus has determined the vulnerability exists only by looking at ***** the Server header returned by the web server running on the target.

Solution

Upgrade to Apache version 1.3.31 or 2.0.49 or later.

Plugin Details

Severity: Medium

ID: 12239

File Name: apache_log_injection.nasl

Version: 1.31

Type: remote

Family: Web Servers

Published: 2004/05/17

Updated: 2018/06/27

Dependencies: 12412, 10107, 12512, 12288, 12517, 12518, 15898, 17975

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: www/apache, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2003/02/24

Reference Information

CVE: CVE-2003-0020

BID: 9930

APPLE-SA: APPLE-SA-2004-05-03

CLSA: CLSA-2004

HPSB: HPSBUX01022

MDKSA: MDKSA-2003

OpenPKG-SA: OpenPKG-SA-2004.021-apache

RHSA: 2003:082, 2003:083, 2003:104, 2003:139, 2003:243, 2003:244

Secunia: 11681, 11705, 11719, 11859, 12246

SSA: SSA

SuSE: SuSE-SA

TLSA: TLSA-2004-11

TSLSA: TSLSA-2004-0017