{"vuid":"VU#663763","idnumber":"663763","name":"Apache mod_proxy_ftp XSS vulnerability","keywords":["Apache","mod_proxy_ftp","URL containing a FTP wildcard character"],"overview":"The Apache web server mod_proxy_ftp module contains a cross-site scripting (XSS) vulnerability.","clean_desc":"The Apache mod_proxy_ftp module allows the Apache web server to act as a proxy for FTP sites. Filename globbing is the process of using wildcards to match filenames. The mod_proxy_ftp module contains an XSS vulnerability that occurs because the module does not properly filter globbed characters in FTP URIs.","impact":"A remote attacker may be able to execute arbitrary Javascript in the context of a site being proxied by the Apache server.","resolution":"Upgrade\nApache has released updates to address this issue. These updates are available on the Apache SVN server: http://svn.apache.org/viewvc?view=rev&revision=682868\nhttp://svn.apache.org/viewvc?view=rev&revision=682870\nhttp://svn.apache.org/viewvc?view=rev&revision=682871 Note that vendors who distribute Apache may not have immediately have a version or update that contains these fixes.","workarounds":"Workarounds\nMozilla Firefox users can use the NoScript extension to keep Javascript from running in untrusted domains. Application firewalls and IPS systems may be able to block certain types of XSS attacks at the network perimeter.","sysaffected":"","thanks":"Thanks to Rapid7 and Apache for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.securityfocus.com/archive/1/495180","http://svn.apache.org/viewvc?view=rev&revision=682868","http://svn.apache.org/viewvc?view=rev&revision=682870","http://svn.apache.org/viewvc?view=rev&revision=682871","http://ftpsearch.ntua.gr/globbing.html","http://noscript.net/"],"cveids":["CVE-2008-2939"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-08-07T17:48:17Z","publicdate":"2008-08-06T00:00:00Z","datefirstpublished":"2008-08-08T13:11:44Z","dateupdated":"2008-08-08T19:17:55Z","revision":17,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"1","cam_impact":"15","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.7","cam_scorecurrentwidelyknown":"2.7","cam_scorecurrentwidelyknownexploited":"4.95","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.7,"vulnote":null}