CVE-2012-0053

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
Severity
UNKNOWN
AV:N/AC:M/Au:N/C:P/I:N/A:N
Atk. Vector
NETWORK
Atk. Complexity
MEDIUM
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
apachehttp_server
2.0.0 ≤
𝑥
< 2.0.65
apachehttp_server
2.2.0 ≤
𝑥
< 2.2.22
debiandebian_linux
5.0
debiandebian_linux
6.0
debiandebian_linux
7.0
opensuseopensuse
11.4
redhatstorage
2.0
redhatenterprise_linux_desktop
6.0
redhatenterprise_linux_eus
6.2
redhatenterprise_linux_server
6.0
redhatenterprise_linux_workstation
6.0
redhatjboss_enterprise_web_server
1.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apache2
bullseye
2.4.62-1~deb11u1
fixed
bullseye (security)
2.4.62-1~deb11u2
fixed
bookworm
2.4.62-1~deb12u1
fixed
bookworm (security)
2.4.62-1~deb12u2
fixed
sid
2.4.62-3
fixed
trixie
2.4.62-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apache2
oneiric
Fixed 2.2.20-1ubuntu1.2
released
natty
Fixed 2.2.17-1ubuntu1.5
released
maverick
Fixed 2.2.16-1ubuntu3.5
released
lucid
Fixed 2.2.14-5ubuntu8.8
released
hardy
Fixed 2.2.8-1ubuntu0.23
released
References