summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorremko <remko@FreeBSD.org>2005-07-27 17:01:45 +0000
committerremko <remko@FreeBSD.org>2005-07-27 17:01:45 +0000
commitbfa7754102b927625e744176ad3f125a60ed70bf (patch)
tree81b334c3dcccd8aa94b9a8dc1d5aa15db746021b
parentb2b7dca2137395b7837ebc7a8fda594c6aa944dc (diff)
downloadFreeBSD-ports-bfa7754102b927625e744176ad3f125a60ed70bf.zip
FreeBSD-ports-bfa7754102b927625e744176ad3f125a60ed70bf.tar.gz
Update my latest Apache entry to make clear that this only affects certain
installations (when Apache is used as a HTTP proxy in combination with some web servers). I didn't make that clear in the first commit. Requested by: nectar Discussed with: clement
-rw-r--r--security/vuxml/vuln.xml13
1 files changed, 12 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0aa78a4..49af2e8 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -82,7 +82,18 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ability to bypass web application firewall protection.
Exploiting this vulnerability requires multiple carefully
crafted HTTP requests, taking advantage of an caching server,
- proxy server, web application firewall etc.</p>
+ proxy server, web application firewall etc. This only affects
+ installations where Apache is used as HTTP proxy in
+ combination with the following web servers:</p>
+ <ul>
+ <il>IIS/6.0 and 5.0</il>
+ <il>Apache 2.0.45 (as web server)</il>
+ <il>apache 1.3.29</il>
+ <il>WebSphere 5.1 and 5.0</il>
+ <il>WebLogic 8.1 SP1</il>
+ <il>Oracle9iAS web server 9.0.2</il>
+ <il>SunONE web server 6.1 SP4</il>
+ </ul>
</body>
</description>
<references>
OpenPOWER on IntegriCloud