Search for vulnerabilities
Vulnerability ID | VCID-cxt1-n6br-aaaf |
Aliases |
CVE-2012-0053
|
Summary | protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 6.2 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | Jan. 31, 2012 |
Description | Apache - httpOnly Cookie Disclosure |
Ransomware campaign use | Known |
Source publication date | Jan. 31, 2012 |
Exploit type | remote |
Platform | multiple |
Source update date | Jan. 31, 2012 |
Source URL | https://gist.github.com/1955a1c28324d4724b7b/7fe51f2a66c1d4a40a736540b3ad3fde02b7fb08 |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.97838 |
EPSS Score | 0.57443 |
Published At | Dec. 17, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |