Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Software Apache

Apache 2.0 Cross-site Scripting Vulnerability 15

jimmy writes ""A vulnerability exists in the SSI error pages of Apache 2.0 that involves incorrect filtering of server signature data. The vulnerability could enable an attacker to hijack web sessions, allowing a range of potential compromises on the targeted host." This Cross site scripting (or XSS) hole has been found in all versions of apache prior to 2.0.43. The advisory can be found here and users are urged to upgrade to address this problem."
This discussion has been archived. No new comments can be posted.

Apache 2.0 Cross-site Scripting Vulnerability

Comments Filter:
  • Lets clarify... (Score:5, Informative)

    by Your_Mom ( 94238 ) <slashdot@i[ ]smir.net ['nni' in gap]> on Wednesday October 02, 2002 @11:06AM (#4373584) Homepage
    Its not /all/ versions of Apache, just All 2.0 versions prior to 2.0.43.
    For those of us still running the 1.3 branch, we're good.
    • Okay so the reporter released early and therefore missed out on the full analysis.

      This is CAN-2002-0840

      Prevent a cross-site scripting vulnerability in the default error page. The issue could only be exploited if the directive UseCanonicalName is set to Off and a server is being run at a domain that allows wildcard DNS. (which are not that common)

      The default setting has been Off in 2.0 since 2.0.33; 1.3 has always had it On, so is not vulnerable by default, but is vulnerable if you set UseCanonicalName to Off.

      Affects Apache 2.0 all versions including 2.0.42 and 1.3 all versions up to 1.3.26

      Expect fixes shortly, but this isn't a very critical vulnerability.
    • Re:Lets clarify... (Score:3, Informative)

      by lylonius ( 20917 )
      Actually, you are mistaken. Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26

      http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN- 2002-0840 [mitre.org]

      Apache release notes here: http://www.apache.org/dist/httpd/Announcement.html [apache.org]
  • This is why I am holding off on upgrading to 2.0.

    Not trying to insult the Apache folks. 2.0 looks to be a great product, and I'm experimenting with it at home. But 2.0 lacks sufficient maturity (in some areas) for me to use it on our production environment right now. I'll probably wait until 2.1.x .

    Yes, all software has bugs, even the mature Apache 1.3 branch. But 2.0 has potentially more bugs...
  • users are urged to upgrade [apache.org] to address this problem.


    But going to http://www.apache.org/dist/httpd/ [apache.org]
    , I read:

    Apache 2.0.42 is the best available version.


    So, where's 2.0.43? Or is someone reporting this too early?

    • It seems that 2.0.43 hasnt been released yet - however if you are building from source, tah patch to fix this issue is in the patches/ directory. I assume they just havent built the release binaries yet
  • by aphor ( 99965 ) on Wednesday October 02, 2002 @09:16PM (#4378138) Journal

    I don't understand why people are whining [slashdot.org] about Apache 2.0 being shunned by the masses. Running a DOT ZERO version means LOTS OF PATCHES. If you can't easily recompile and move on (like your site depends on changing interfaces/features/bugs) then dot zero is not for you.

    This isn't a chink in Apache's gleaming armor. Its free software. The process is just plain old programming and software evolution. Dot zero is for people of the bleeding edge. Not all websites qualify. The Apache way is a superior way to the IIS way. Other ways may be just dandy also. Problems with Apache 2.0 are no indication on that issue as long as they are.

  • Is it me or it seems that apache 2.0 gets more bad press than the older version?. Maybe that's why almost no one is switching, 2.0 seems to be not so stable yet while 1.3 looks solid enough.

Beware of Programmers who carry screwdrivers. -- Leonard Brandwein

Working...