Vulnerability Name: CVE-2002-0840 (CCN-10241) Assigned: 2002-10-02 Published: 2002-10-02 Updated: 2021-06-06 Summary: Cross-site scripting (XSS) vulnerability in the default error page of Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when UseCanonicalName is "Off" and support for wildcard DNS is present, allows remote attackers to execute script as other web page visitors via the Host: header, a different vulnerability than CAN-2002-1157 . CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Access References: Source: SGI Type: UNKNOWN20021105-02-I Source: BUGTRAQ Type: UNKNOWN20021017 TSLSA-2002-0069-apache Source: CCN Type: Gentoo Security Linux Announcement 200211-003Cross-Site Scripting Vulnerability Source: CCN Type: Hewlett-Packard Company Security Bulletin HPSBUX0210-224SSRT2393 Apache Vulnerabilities (rev. 1) Source: CCN Type: Full-Disclosure Mailing List, Wed, 2 Oct 2002 09:00:59 -0400 Apache 2 Cross-Site Scripting Source: VULNWATCH Type: UNKNOWN20021002 Apache 2 Cross-Site Scripting Source: CCN Type: Nessus plugin ID : 11137Apache < 1.3.27 Source: MITRE Type: CNACVE-2002-0840 Source: CONECTIVA Type: UNKNOWNCLA-2002:530 Source: CCN Type: Conectiva Linux Announcement CLSA-2002:530DoS and other vulnerabilities Source: CCN Type: Apache Web siteWelcome! - The Apache HTTP Server Project Source: CONFIRM Type: UNKNOWNhttp://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2 Source: BUGTRAQ Type: UNKNOWN20021002 Apache 2 Cross-Site Scripting Source: BUGTRAQ Type: UNKNOWN20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache) Source: HP Type: UNKNOWNHPSBUX0210-224 Source: CCN Type: Oracle Security Alert #45Security Release of Apache 1.3.27 Source: CCN Type: RHSA-2002-222Updated apache Source: CCN Type: RHSA-2002-248apache Source: CCN Type: RHSA-2002-251apache security update Source: CCN Type: RHSA-2003-106Updated apache and mod_ssl packages available Source: CCN Type: ApacheWeek, Issue 311, 4th October 2002Security Reports Source: CONFIRM Type: Vendor Advisoryhttp://www.apacheweek.com/issues/02-10-04 Source: CCN Type: CIAC Information Bulletin N-005Apache 1.3.27 HTTP Server Release Source: DEBIAN Type: UNKNOWNDSA-187 Source: DEBIAN Type: UNKNOWNDSA-188 Source: DEBIAN Type: UNKNOWNDSA-195 Source: DEBIAN Type: DSA-187apache -- several vulnerabilities Source: DEBIAN Type: DSA-188apache-ssl -- several vulnerabilities Source: DEBIAN Type: DSA-195apache-perl -- several vulnerabilities Source: CCN Type: US-CERT VU#240329Apache HTTPD server vulnerable to cross site scripting on error page when using wildcard DNS Source: CERT-VN Type: US Government ResourceVU#240329 Source: MANDRAKE Type: UNKNOWNMDKSA-2002:068 Source: ENGARDE Type: UNKNOWNESA-20021007-024 Source: CCN Type: SCO Security Advisory CSSA-2002-056.0Linux: apache vulnerabilities in shared memory, DNS, and ApacheBench Source: CCN Type: SCO Security Advisory CSSA-2003-SCO.10.1OpenServer 5.0.5 OpenServer 5.0.6 : Various security fixes for Apache. Source: CCN Type: OpenPKG-SA-2002.009Apache Source: CCN Type: OpenPKG-SA-2002.010Apache mod_ssl Source: OSVDB Type: UNKNOWN862 Source: CCN Type: OSVDB ID: 862Apache HTTP Server SSI Error Page XSS Source: REDHAT Type: UNKNOWNRHSA-2002:222 Source: REDHAT Type: UNKNOWNRHSA-2002:243 Source: REDHAT Type: UNKNOWNRHSA-2002:244 Source: REDHAT Type: UNKNOWNRHSA-2002:248 Source: REDHAT Type: UNKNOWNRHSA-2002:251 Source: REDHAT Type: UNKNOWNRHSA-2003:106 Source: BID Type: UNKNOWN5847 Source: CCN Type: BID-5847Apache Server Side Include Cross Site Scripting Vulnerability Source: CCN Type: Trustix Secure Linux Security Advisory #2002-0069apache Source: XF Type: UNKNOWNapache-http-host-xss(10241) Source: XF Type: UNKNOWNapache-http-host-xss(10241) Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/ Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ Source: MLIST Type: UNKNOWN[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: UNKNOWN[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ Vulnerable Configuration: Configuration 1 :cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.4:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.6:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:9.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle8i:8.1.7_.0.0_enterprise:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle8i:8.1.7_.1.0_enterprise:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:9.0.2.1:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle9i:9.0.1:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle9i:9.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:8.1.7:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle9i:9.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:9.0.2:r2:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle8i:8.1.7.1:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle8i:8.1.7:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.9:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:9.2.1:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle9i:9.0.1.3:*:*:*:*:*:*:* OR cpe:/a:oracle:oracle9i:9.0.1.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:9.2.2:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:http_server:1.3:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:8.1.7:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:9.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:9.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.6:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.9:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.38:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.42:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2.1s:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.40:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.4:*:*:*:*:*:*:* OR cpe:/a:oracle:database_server:8.1.7.1:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:1.0.2:*:*:*:*:*:*:* OR cpe:/a:oracle:application_server:9.0.2:r2:*:*:*:*:*:* OR cpe:/a:oracle:reports:9.0.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:2.0.41:*:*:*:*:*:*:* AND cpe:/a:redhat:stronghold:*:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache http server 1.3.18
apache http server 1.3.19
apache http server 1.3.4
apache http server 1.3.6
apache http server 2.0.37
apache http server 2.0.38
oracle application server 1.0.2.2
oracle application server 9.0.2
oracle oracle8i 8.1.7_.0.0_enterprise
oracle oracle8i 8.1.7_.1.0_enterprise
apache http server 1.3
apache http server 1.3.1
oracle application server 9.0.2.1
oracle oracle9i 9.0.1
oracle oracle9i 9.0.2
oracle database server 8.1.7
apache http server 2.0.35
oracle oracle9i 9.0
apache http server 2.0.39
oracle application server 9.0.2 r2
apache http server 1.3.20
oracle oracle8i 8.1.7.1
oracle oracle8i 8.1.7
oracle application server 1.0.2.1s
apache http server 1.3.12
apache http server 1.3.3
apache http server 1.3.17
apache http server 1.3.26
apache http server 1.3.9
apache http server 2.0.40
apache http server 2.0.36
apache http server 1.3.14
apache http server 1.3.22
apache http server 1.3.11
apache http server 2.0
oracle application server 1.0.2
apache http server 2.0.42
apache http server 1.3.23
apache http server 1.3.25
oracle database server 9.2.1
apache http server 1.3.24
apache http server 2.0.41
apache http server 2.0.32
oracle oracle9i 9.0.1.3
oracle oracle9i 9.0.1.2
apache http server 2.0.28
oracle database server 9.2.2
apache http server 1.3
oracle database server 8.1.7
apache http server 1.3.1
apache http server 1.3.19
oracle database server 9.0
apache http server 2.0
oracle application server 9.0.2
apache http server 1.3.26
apache http server 1.3.6
apache http server 1.3.9
apache http server 1.3.12
apache http server 1.3.20
apache http server 1.3.23
apache http server 1.3.17
apache http server 1.3.14
apache http server 2.0.38
apache http server 2.0.39
apache http server 2.0.42
apache http server 1.3.11
oracle application server 1.0.2.2
oracle application server 1.0.2.1s
apache http server 2.0.40
apache http server 1.3.3
apache http server 1.3.24
apache http server 1.3.22
apache http server 1.3.4
oracle database server 8.1.7.1
apache http server 1.3.18
apache http server 1.3.25
oracle application server 1.0.2
oracle application server 9.0.2 r2
oracle reports 9.0.2
apache http server 2.0.28
apache http server 2.0.32
apache http server 2.0.35
apache http server 2.0.36
apache http server 2.0.37
apache http server 2.0.41
redhat stronghold *
redhat enterprise linux 2.1
redhat linux advanced workstation 2.1