Apache < 1.3.31 / 2.0.49 Log Entry Terminal Escape Sequence Injection

medium Nessus Plugin ID 12239

Language:

Synopsis

The remote web server is affected by a log injection vulnerability.

Description

The target is running an Apache web server that allows for the injection of arbitrary escape sequences into its error logs. An attacker might use this vulnerability in an attempt to exploit similar vulnerabilities in terminal emulators.

***** Nessus has determined the vulnerability exists only by looking at ***** the Server header returned by the web server running on the target.

Solution

Upgrade to Apache version 1.3.31 or 2.0.49 or later.

Plugin Details

Severity: Medium

ID: 12239

File Name: apache_log_injection.nasl

Version: 1.34

Type: remote

Family: Web Servers

Published: 5/17/2004

Updated: 8/15/2022

Configuration: Enable paranoid mode, Enable thorough checks

Risk Information

VPR

Risk Factor: Low

Score: 3.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: www/apache, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/24/2003

Reference Information

CVE: CVE-2003-0020

BID: 9930

APPLE-SA: APPLE-SA-2004-05-03

CLSA: CLSA-2004

HPSB: HPSBUX01022

MDKSA: MDKSA-2003

RHSA: 2003:082, 2003:083, 2003:104, 2003:139, 2003:243, 2003:244

SSA: SSA

SuSE: SuSE-SA

TLSA: TLSA-2004-11

TSLSA: TSLSA-2004-0017

SECUNIA: 11681, 11719, 12246, 11859, 11705

OPENPKG-SA: OpenPKG-SA-2004.021-apache