Bug 409831 (CVE-2007-6203)

Summary: CVE-2007-6203 httpd: Garbage before http method name is not escaped in a reply in case of errorneous request
Product: [Other] Security Response Reporter: Lubomir Kundrak <lkundrak>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jorton, t.matsuu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6203
Whiteboard:
Fixed In Version: apache 2.2.8, apache 2.0.63 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-12-04 08:16:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 445729, 445888    
Bug Blocks:    

Description Lubomir Kundrak 2007-12-04 08:13:57 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2007-6203 to the following vulnerability:

Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

References:

http://www.securityfocus.com/archive/1/archive/1/484410/100/0/threaded
http://procheckup.com/Vulnerability_PR07-37.php
http://www.securityfocus.com/bid/26663
http://www.frsirt.com/english/advisories/2007/4060
http://secunia.com/advisories/27906

Comment 1 Lubomir Kundrak 2007-12-04 08:16:39 UTC
Not vulnerable.

User can not control the part of the HTTP request before the method name and
thus can not be tricked into including malicious code there.

Comment 5 Mark J. Cox 2008-01-08 11:34:16 UTC
Red Hat does not consider this issue to be a vulnerability. In order to exploit
this for cross-site scripting, the attacker would have to force the victims
browser to supply an arbitrary malformed HTTP method to a target site, and that
is not possible with current browsers or plugins.

Comment 6 Tomas Hoger 2008-11-04 15:31:11 UTC
As described in the comment #5, this issue is not considered to be a security vulnerability.  However, due to the customer requests, problem was addressed as a regular bug in the following update for the httpd package in Red Hat Enterprise Linux 4 (released with 4.7):

  https://rhn.redhat.com/errata/RHBA-2008-0763.html
  * the request method is escaped in the built-in HTTP error responses.

The fix is also planned to be released in the httpd bug fix errata included in Red Hat Enterprise Linux 5.3.

Comment 7 Tomas Hoger 2009-11-13 08:49:58 UTC
(In reply to comment #6)
> The fix is also planned to be released in the httpd bug fix errata included in
> Red Hat Enterprise Linux 5.3.

Included now also in httpd packages for Red Hat Enterprise Linux 5 as of:
  http://rhn.redhat.com/errata/RHBA-2009-0185.html

Patch name in SRPM: httpd-2.0.52-escaperrs.patch

Comment 8 Vincent Danen 2011-09-19 21:13:09 UTC
Statement:

Red Hat does not consider this issue to be a vulnerability. In order to exploit this for cross-site scripting, the attacker would have to get the victim to supply an arbitrary malformed HTTP method to a target site.  However, this has been fixed in Red Hat Enterprise Linux 5 via RHBA-2009:0185 as a bug fix.