CVE-2007-6203 (CNNVD-200712-012)

MEDIUM 有利用代码
中文标题:
Apache HTTP Server HTTP 413错误页面跨站脚本漏洞
英文标题:
Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP r...
CVSS分数: 4.3
发布时间: 2007-12-03 22:00:00
漏洞类型: 跨站脚本
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Apache HTTP Server是一款流行的Web服务器。 Apache HTTP Server处理畸形用户请求时存在漏洞,远程攻击者可能利用此漏洞获取脚本源码。 如果远程用户提交的畸形HTTP请求承载有以下形式之一负载(如JavaScript)和无效长度数据的话,就会导致Apache HTTP服务器返回客户端所提供的脚本代码: 两个Content-length头等于0,如Content-Length: 0[LF]Content-Length: 0 一个Content-length头等于两个值,如Content-length: 0, 0 一个Content-length:头等于负数,如Content-length: -1 一个Content-length头等于很大的值,如Content-length: 9999999999999999999999999999999999999999999999。 提交了无效长度数据后Apache就会返回413 Request Entity Too Large错误,导致在用户浏览器会话中执行任意HTML和脚本代码。

英文描述:

Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

CWE类型:
CWE-79
标签:
remote unix Adrian Pastor OSVDB-39003
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apache http_server 2.0.46 - - cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
apache http_server 2.0.47 - - cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
apache http_server 2.0.48 - - cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
apache http_server 2.0.49 - - cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
apache http_server 2.0.50 - - cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
apache http_server 2.0.51 - - cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
apache http_server 2.0.52 - - cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
apache http_server 2.0.53 - - cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
apache http_server 2.0.54 - - cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
apache http_server 2.0.55 - - cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
apache http_server 2.0.57 - - cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
apache http_server 2.0.58 - - cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
apache http_server 2.0.59 - - cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
apache http_server 2.1.1 - - cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
apache http_server 2.1.2 - - cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
apache http_server 2.1.3 - - cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
apache http_server 2.1.4 - - cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
apache http_server 2.1.5 - - cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
apache http_server 2.1.6 - - cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
apache http_server 2.1.7 - - cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
apache http_server 2.1.8 - - cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
apache http_server 2.2.0 - - cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
apache http_server 2.2.2 - - cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
apache http_server 2.2.3 - - cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
apache http_server 2.2.4 - - cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
PK57952 vendor-advisory
cve.org
访问
GLSA-200803-19 vendor-advisory
cve.org
访问
26663 vdb-entry
cve.org
访问
oval:org.mitre.oval:def:12166 vdb-entry
cve.org
访问
34219 third-party-advisory
cve.org
访问
HPSBUX02465 vendor-advisory
cve.org
访问
27906 third-party-advisory
cve.org
访问
ADV-2008-1623 vdb-entry
cve.org
访问
ADV-2008-0924 vdb-entry
cve.org
访问
3411 third-party-advisory
cve.org
访问
ADV-2007-4301 vdb-entry
cve.org
访问
USN-731-1 vendor-advisory
cve.org
访问
HPSBUX02612 vendor-advisory
cve.org
访问
29420 third-party-advisory
cve.org
访问
ADV-2007-4060 vdb-entry
cve.org
访问
APPLE-SA-2008-03-18 vendor-advisory
cve.org
访问
33105 third-party-advisory
cve.org
访问
1019030 vdb-entry
cve.org
访问
PK65782 vendor-advisory
cve.org
访问
20071130 PR07-37: XSS on Apache HTTP Server 413 error pages via malformed HTTP method mailing-list
cve.org
访问
29348 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
28196 third-party-advisory
cve.org
访问
SUSE-SA:2008:021 vendor-advisory
cve.org
访问
30356 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
29640 third-party-advisory
cve.org
访问
apache-413error-xss(38800) vdb-entry
cve.org
访问
ADV-2008-1875 vdb-entry
cve.org
访问
30732 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ExploitDB EDB-30835 EXPLOIT
exploitdb
访问
Download Exploit EDB-30835 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2007-6203 ADVISORY
cve.org
访问
CVSS评分详情
4.3
MEDIUM
CVSS向量: AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS版本: 2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2007-12-03 22:00:00
修改时间:
2024-08-07 15:54:27
创建时间:
2025-11-11 15:32:48
更新时间:
2025-11-11 16:25:43
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2007-6203 2025-11-11 15:17:57 2025-11-11 07:32:48
NVD nvd_CVE-2007-6203 2025-11-11 14:52:13 2025-11-11 07:41:34
CNNVD cnnvd_CNNVD-200712-012 2025-11-11 15:08:59 2025-11-11 07:49:22
EXPLOITDB exploitdb_EDB-30835 2025-11-11 15:05:48 2025-11-11 08:25:43
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:25:43
references_count: 31 → 34; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 31 -> 34
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:22
vulnerability_type: 未提取 → 跨站脚本; cnnvd_id: 未提取 → CNNVD-200712-012; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 跨站脚本
  • cnnvd_id: 未提取 -> CNNVD-200712-012
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:34
cvss_score: 未提取 → 4.3; cvss_vector: NOT_EXTRACTED → AV:N/AC:M/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 25; references_count: 33 → 31; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.3
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:N/I:P/A:N
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 25
  • references_count: 33 -> 31
  • data_sources: ['cve'] -> ['cve', 'nvd']