Bug 409831 (CVE-2007-6203)
Summary: | CVE-2007-6203 httpd: Garbage before http method name is not escaped in a reply in case of errorneous request | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Lubomir Kundrak <lkundrak> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | jorton, t.matsuu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6203 | ||
Whiteboard: | |||
Fixed In Version: | apache 2.2.8, apache 2.0.63 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2007-12-04 08:16:39 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 445729, 445888 | ||
Bug Blocks: |
Description
Lubomir Kundrak
2007-12-04 08:13:57 UTC
Not vulnerable. User can not control the part of the HTTP request before the method name and thus can not be tricked into including malicious code there. Is this should be backported? http://svn.apache.org/viewvc?view=rev&revision=600645 http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/http/http_protocol.c?r1=594839&r2=600645&pathrev=600645 Red Hat does not consider this issue to be a vulnerability. In order to exploit this for cross-site scripting, the attacker would have to force the victims browser to supply an arbitrary malformed HTTP method to a target site, and that is not possible with current browsers or plugins. As described in the comment #5, this issue is not considered to be a security vulnerability. However, due to the customer requests, problem was addressed as a regular bug in the following update for the httpd package in Red Hat Enterprise Linux 4 (released with 4.7): https://rhn.redhat.com/errata/RHBA-2008-0763.html * the request method is escaped in the built-in HTTP error responses. The fix is also planned to be released in the httpd bug fix errata included in Red Hat Enterprise Linux 5.3. (In reply to comment #6) > The fix is also planned to be released in the httpd bug fix errata included in > Red Hat Enterprise Linux 5.3. Included now also in httpd packages for Red Hat Enterprise Linux 5 as of: http://rhn.redhat.com/errata/RHBA-2009-0185.html Patch name in SRPM: httpd-2.0.52-escaperrs.patch Statement: Red Hat does not consider this issue to be a vulnerability. In order to exploit this for cross-site scripting, the attacker would have to get the victim to supply an arbitrary malformed HTTP method to a target site. However, this has been fixed in Red Hat Enterprise Linux 5 via RHBA-2009:0185 as a bug fix. |