First published: Mon Nov 04 2002(Updated: )
Cross-site scripting vulnerability in the mod_ssl Apache module 2.8.9 and earlier, when UseCanonicalName is off and wildcard DNS is enabled, allows remote attackers to execute script as other web site visitors, via the server name in an HTTPS response on the SSL port, which is used in a self-referencing URL, a different vulnerability than CAN-2002-0840.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Mod SSL | <=2.8.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1157 has a critical severity rating due to its potential for Cross-site scripting attacks.
To fix CVE-2002-1157, you should upgrade mod_ssl to version 2.8.9 or later.
CVE-2002-1157 affects mod_ssl versions up to and including 2.8.9.
CVE-2002-1157 enables remote attackers to execute scripts in the context of other web site visitors through Cross-site scripting.
CVE-2002-1157 exploits wildcard DNS when UseCanonicalName is off, allowing crafted server names to be reflected in HTTPS responses.