Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2012-0053

Disclosure Date: January 28, 2012
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • apache,
  • debian,
  • opensuse,
  • redhat,
  • suse

Products

  • debian linux 5.0,
  • debian linux 6.0,
  • debian linux 7.0,
  • enterprise linux desktop 6.0,
  • enterprise linux eus 6.2,
  • enterprise linux server 6.0,
  • enterprise linux workstation 6.0,
  • http server,
  • jboss enterprise web server 1.0.0,
  • linux enterprise server 10,
  • linux enterprise software development kit 10,
  • opensuse 11.4,
  • storage 2.0

References

Advisory

Additional Info

Technical Analysis