CVE-2012-0053

EUVD-2012-0092
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
apachehttp_server
2.0.0 ≤
𝑥
< 2.0.65
apachehttp_server
2.2.0 ≤
𝑥
< 2.2.22
debiandebian_linux
5.0
debiandebian_linux
6.0
debiandebian_linux
7.0
opensuseopensuse
11.4
redhatstorage
2.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.2
redhatenterprise_linux_server
6.0
redhatenterprise_linux_workstation
6.0
redhatjboss_enterprise_web_server
1.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apache2
bookworm
2.4.62-1~deb12u1
fixed
bookworm (security)
2.4.62-1~deb12u2
fixed
bullseye
2.4.62-1~deb11u1
fixed
bullseye (security)
2.4.62-1~deb11u2
fixed
sid
2.4.62-3
fixed
trixie
2.4.62-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apache2
hardy
Fixed 2.2.8-1ubuntu0.23
released
lucid
Fixed 2.2.14-5ubuntu8.8
released
maverick
Fixed 2.2.16-1ubuntu3.5
released
natty
Fixed 2.2.17-1ubuntu1.5
released
oneiric
Fixed 2.2.20-1ubuntu1.2
released
References