apache
Page content
- Vulnerable: 2.2.8-2kalgan1
- Unaffected: 2.2.8-2kalgan2
A vulnerability has been reported in Apache, which can be exploited by malicious people to conduct cross-site scripting attacks. Input passed to mod_proxy_ftp via an URL containing a FTP wildcard character (e.g. “*”), is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
- Bug Tracker URL: http://bugs.frugalware.org/task/3307