Apache mod_proxy_ftp Directory Component Wildcard Character Globbing XSS

Medium Nessus Plugin ID 34433

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 2.2


The remote web server is vulnerable to a cross-site scripting attack.


The mod_proxy_ftp module in the version of Apache running on the remote host fails to properly sanitize user-supplied URL input before using it to generate dynamic HTML output. Using specially crafted requests for FTP URLs with globbing characters (such as asterisk, tilde, opening square bracket, etc), an attacker may be able to leverage this issue to inject arbitrary HTML and script code into a user's browser to be executed within the security context of the affected site.


Upgrade to Apache version 2.2.10 or later. Alternatively, disable the affected module.

See Also





Plugin Details

Severity: Medium

ID: 34433

File Name: apache_mod_proxy_ftp_glob_xss.nasl

Version: 1.22

Type: remote

Family: Web Servers

Published: 2008/10/16

Updated: 2018/11/15

Dependencies: 10815, 48204

Risk Information

Risk Factor: Medium

VPR Score: 2.2

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Available: false

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Reference Information

CVE: CVE-2008-2939

BID: 30560

CWE: 79