CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
Published 2008-01-25 01:00:00
Updated 2022-09-21 19:08:28
Source MITRE
View at NVD,   CVE.org

Products affected by CVE-2008-0456

Threat overview for CVE-2008-0456

Top countries where our scanners detected CVE-2008-0456
Top open port discovered on systems with this issue 80
IPs affected by CVE-2008-0456 301,343
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2008-0456!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.

Exploit prediction scoring system (EPSS) score for CVE-2008-0456

0.96%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2008-0456

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
2.6
LOW AV:N/AC:H/Au:N/C:N/I:P/A:N
4.9
2.9
NIST

CWE ids for CVE-2008-0456

Vendor statements for CVE-2008-0456

  • Red Hat 2008-01-25
    We do not consider this issue to be security sensitive. Untrusted users should not be permitted to upload files to the directories from where they can be directly served by the web server without prior careful sanitation of both contents and filename.

References for CVE-2008-0456

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!