Hide Forgot
A security flaw was found in the way httpd, Apache HTTP server, performed sanitization of the content of the SCRIPT_NAME environment variable prior passing it to the particular CGI (Common Gateway Interface) script. A remote attacker could provide a specially-crafted URL, which once processed by the Apache HTTP server and passed to the CGI application in the form of SCRIPT_NAME variable, could lead to cross-site (XSS) attack (arbitrary web script or HTML execution) if that CGI application relied on the content of SCRIPT_NAME variable to be safe. Upstream bug report: [1] https://issues.apache.org/bugzilla/show_bug.cgi?id=10775 Upstream patch: [2] https://issues.apache.org/bugzilla/attachment.cgi?id=13169&action=diff
This issue affects the version of the httpd package, as shipped with Red Hat Enterprise Linux 4. -- This issue did NOT affect the versions of the httpd package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue did NOT affect the versions of the httpd package, as shipped with Fedora release of 15 and 16.
Acknowledgements: Red Hat would like to thank Maxim Rupp for reporting this issue.
Is there a CVE?
Red Hat Enterprise Linux 4 is already in the Extended Life Phase, and this issue does not qualify for fix via Extended Lifecycle Support (ELS). Closing.