Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2003-0020 | First vendor Publication | 2003-03-18 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0020 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-15 | Command Delimiters |
CAPEC-41 | Using Meta-characters in E-mail Headers to Inject Malicious Payloads |
CAPEC-81 | Web Logs Tampering |
CAPEC-93 | Log Injection-Tampering-Forging |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:100109 | |||
Oval ID: | oval:org.mitre.oval:def:100109 | ||
Title: | Apache Error Log Escape Sequence Filtering Vulnerability | ||
Description: | Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0020 | Version: | 1 |
Platform(s): | Sun Solaris 8 Sun Solaris 9 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:150 | |||
Oval ID: | oval:org.mitre.oval:def:150 | ||
Title: | Apache Terminal Escape Sequence Vulnerability | ||
Description: | Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0020 | Version: | 4 |
Platform(s): | Red Hat Linux 9 | Product(s): | Apache |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:4114 | |||
Oval ID: | oval:org.mitre.oval:def:4114 | ||
Title: | Apache Error Log Escape Sequence Injection Vulnerability | ||
Description: | Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2003-0020 | Version: | 1 |
Platform(s): | Sun Solaris 8 Sun Solaris 9 | Product(s): | Apache |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2009-10-26 | jetty 6.x - 7.x xss, information disclosure, injection |
OpenVAS Exploits
Date | Description |
---|---|
2009-10-10 | Name : SLES9: Security update for Apache2 File : nvt/sles9p5017147.nasl |
2009-05-05 | Name : HP-UX Update for Apache HPSBUX01022 File : nvt/gb_hp_ux_HPSBUX01022.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200405-22 (Apache) File : nvt/glsa_200405_22.nasl |
2005-11-03 | Name : Apache Error Log Escape Sequence Injection File : nvt/apache_log_injection.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2004-133-01 apache File : nvt/esoft_slk_ssa_2004_133_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
4382 | Apache HTTP Server Log Entry Terminal Escape Sequence Injection Apache HTTP Server contains a flaw that may allow a malicious user to inject terminal escape sequences into Apache's error log. The issue is triggered when Apache fails to strip the escape sequences. If an administrator views the log files using certain terminal applications it may execute the escape sequences with the privileges of the administrator. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2004-133-01.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30646.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30650.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30649.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30648.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30645.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30644.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30643.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30642.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30641.nasl - Type : ACT_GATHER_INFO |
2005-03-18 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30640.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30647.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_30639.nasl - Type : ACT_GATHER_INFO |
2004-12-02 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd20041202.nasl - Type : ACT_GATHER_INFO |
2004-10-17 | Name : The remote host is missing Sun Security Patch number 116974-07 File : solaris8_x86_116974.nasl - Type : ACT_GATHER_INFO |
2004-10-17 | Name : The remote host is missing Sun Security Patch number 116973-07 File : solaris8_116973.nasl - Type : ACT_GATHER_INFO |
2004-08-30 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200405-22.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-050.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-046.nasl - Type : ACT_GATHER_INFO |
2004-07-23 | Name : The remote Fedora Core host is missing a security update. File : fedora_2004-117.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 114145-12 File : solaris9_x86_114145.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 113146-13 File : solaris9_113146.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-244.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The RedHat version have been identified. File : redhat_fixes.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote host is using an unsupported version of Mac OS X. File : macosx_version.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd20040503.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote host is missing a Mac OS X security update. File : macosx_SecUpd20040126.nasl - Type : ACT_GATHER_INFO |
2004-05-17 | Name : The remote web server is affected by a log injection vulnerability. File : apache_log_injection.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:34 |
|
2024-11-28 12:05:29 |
|
2023-11-07 21:48:11 |
|
2023-08-12 12:02:35 |
|
2023-08-12 01:01:17 |
|
2023-08-11 12:02:13 |
|
2023-08-11 01:01:18 |
|
2023-08-06 12:02:02 |
|
2023-08-06 01:01:18 |
|
2023-08-04 12:02:06 |
|
2023-08-04 01:01:18 |
|
2023-07-14 12:02:05 |
|
2023-07-14 01:01:18 |
|
2023-03-29 01:02:03 |
|
2023-03-28 12:01:23 |
|
2021-06-25 01:01:24 |
|
2021-06-06 17:23:05 |
|
2021-05-04 12:02:13 |
|
2021-04-22 01:02:22 |
|
2021-03-30 17:22:45 |
|
2020-10-13 21:22:53 |
|
2020-05-23 00:15:20 |
|
2019-08-20 12:00:45 |
|
2017-10-10 09:23:25 |
|
2016-10-18 12:01:08 |
|
2016-04-26 12:29:31 |
|
2014-02-17 10:25:42 |
|
2013-05-11 11:50:05 |
|