Apache mod_negotiation Multi-Line Filename Upload Vulnerabilities
Medium Nessus Plugin ID 17692
SynopsisThe remote web server may be affected by one or more issues.
DescriptionAccording to its banner, the version of Apache running on the remote host does not properly escape filenames in 406 responses. A remote attacker can exploit this to inject arbitrary HTTP headers or conduct cross-site scripting attacks by uploading a file with a specially crafted name.
Note that the remote web server may not actually be affected by these vulnerabilities as Nessus has relied solely on the version number in the server's banner.
SolutionUpgrade to Apache 2.3.2 or later. Alternatively, apply the workaround referenced in the vendor advisory.