CVE-2008-2939

Scores

EPSS

0.000none0.0%
0%20%40%60%80%100%

Percentile: 0.0%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-79

Recommendations

Source: nvd

UpgradeApache has released updates to address this issue. These updates are available on the Apache SVN server:http://svn.apache.org/viewvc?view=rev&revision=682868http://svn.apache.org/viewvc?view=rev&revision=682870http://svn.apache.org/viewvc?view=rev&revision=682871Note that vendors who distribute Apache may not have immediately have a version or update that contains these fixes.WorkaroundsMozilla Firefox users can use the NoScript extension to keep Javascript from running in untrusted domains.Application firewalls and IPS systems may be able to block certain types of XSS attacks at the network perimeter.

URL: http://www.kb.cert.org/vuls/id/663763

Vulnerable Software (8)

Type: Configuration

Product: apache

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Product: apache2

Operating System: ubuntu hardy 8.04

Trait:
{  "fixed": "2.2.8-1ubuntu0.4"}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{  "fixed": "2.2.9-7"}

Source: debian

Type: Configuration

Product: apache2

Operating System: debian etch 4

Trait:
{  "fixed": "2.2.3-4+etch6"}

Source: debian

Type: Configuration

Vendor: apache

Product: http_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.0.63",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:apa...

Source: nvd

Type: Configuration

Vendor: apple

Product: mac_os_x

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",      "versionEndIncluding": "10.5.6",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonic...

Source: nvd

Type: Configuration

Vendor: canonical

Product: ubuntu_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",      "versionEndIncluding": "10.5.6",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonic...

Source: nvd

Type: Configuration

Vendor: opensuse

Product: opensuse

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",      "versionEndIncluding": "10.5.6",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:canonic...

Source: nvd