The default configuration of the apache2 package in Debian GNU/Linux squeeze before 2.2.16-6+squeeze7, wheezy before 2.2.22-4, and sid before 2.2.22-4, when mod_php or mod_rivet is used, provides example scripts under the doc/ URI, which might allow local users to conduct cross-site scripting (XSS) attacks, gain privileges, or obtain sensitive information via vectors involving localhost HTTP requests to the Apache HTTP Server.
References
Link | Resource |
---|---|
http://www.debian.org/security/2012/dsa-2452 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75211 | Third Party Advisory |
http://www.debian.org/security/2012/dsa-2452 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75211 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
29 Apr 2025, 21:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2012/dsa-2452 - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75211 - Third Party Advisory |
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2012/dsa-2452 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/75211 - |
Information
Published : 2012-04-22 18:55
Updated : 2025-04-29 21:13
NVD link : CVE-2012-0216
Mitre link : CVE-2012-0216
CVE.ORG link : CVE-2012-0216
JSON object : View
Products Affected
debian
- apache2
CWE