Apache mod_negotiation Multi-Line Filename Upload Vulnerabilities

Medium Nessus Plugin ID 17692


The remote web server may be affected by one or more issues.


According to its banner, the version of Apache running on the remote host does not properly escape filenames in 406 responses. A remote attacker can exploit this to inject arbitrary HTTP headers or conduct cross-site scripting attacks by uploading a file with a specially crafted name.

Note that the remote web server may not actually be affected by these vulnerabilities as Nessus has relied solely on the version number in the server's banner.


Upgrade to Apache 2.3.2 or later. Alternatively, apply the workaround referenced in the vendor advisory.

See Also




Plugin Details

Severity: Medium

ID: 17692

File Name: apache_mod_negotiation_xss.nasl

Version: $Revision: 1.11 $

Type: remote

Family: Web Servers

Published: 2011/11/18

Modified: 2018/01/23

Dependencies: 48204

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache, Settings/PCI_DSS

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2008/01/22

Reference Information

CVE: CVE-2008-0455, CVE-2008-0456

BID: 27409

OSVDB: 41018, 41019

CWE: 79, 94