CVE-2007-6388
Description
Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-site scripting in Apache HTTP Server mod_status via unspecified vectors, exploitable when server-status is enabled, affecting versions 1.3.2 through 2.2.6.
Vulnerability
CVE-2007-6388 is a cross-site scripting (XSS) vulnerability in the mod_status module of the Apache HTTP Server. The flaw is present in versions 1.3.2 through 1.3.39, 2.0.35 through 2.0.61, and 2.2.0 through 2.2.6. The vulnerability exists when the server-status page is enabled, allowing remote attackers to inject arbitrary web script or HTML via unspecified vectors [1][2][3].
Exploitation
An attacker only needs network access to the Apache server with mod_status and the server-status page enabled. No authentication or special privileges are required. The attacker can craft a specially crafted request to the server-status page, which reflects malicious script or HTML back to the user's browser without proper sanitization. The exact input vector is unspecified in the available references, but typical XSS exploitation involves injecting script through URL parameters or HTTP headers processed by mod_status [1][4].
Impact
Successful exploitation allows the attacker to execute arbitrary web script or HTML in the context of the victim's browser when viewing the server-status page. This can lead to session theft, credential harvesting, or other client-side attacks. The impact is considered moderate as it requires user interaction (accessing the status page) and does not directly compromise the server itself [1][4].
Mitigation
The vulnerability is fixed in Apache HTTP Server versions 2.2.8 (released December 2007) and later [1], and in 2.0.63 (released 2008) [2]. For the 1.3 branch, which is end-of-life, no fix was released; users are advised to upgrade to a supported version [3]. IBM HTTP Server users can apply Interim Fix PK65782 for version 2.0.47 [4]. If patching is not possible, disable mod_status or restrict access to the server-status page via configuration (e.g., using Location directives with Require ip).
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*range: >=1.3.2,<=1.3.39
- (no CPE)range: 2.2.0 to 2.2.6, 2.0.35 to 2.0.61, 1.3.2 to 1.3.39
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
94- www.mandriva.com/security/advisoriesnvdPatchThird Party Advisory
- www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2008/05/023342-01.pdfnvdPatchThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-February/msg00541.htmlnvdPatchThird Party Advisory
- www.redhat.com/archives/fedora-package-announce/2008-February/msg00562.htmlnvdPatchThird Party Advisory
- docs.info.apple.com/article.htmlnvdThird Party AdvisoryVDB Entry
- httpd.apache.org/security/vulnerabilities_13.htmlnvdThird Party AdvisoryVDB Entry
- httpd.apache.org/security/vulnerabilities_20.htmlnvdThird Party AdvisoryVDB Entry
- httpd.apache.org/security/vulnerabilities_22.htmlnvdThird Party AdvisoryVDB Entry
- lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.htmlnvdThird Party Advisory
- lists.vmware.com/pipermail/security-announce/2009/000062.htmlnvdThird Party Advisory
- marc.infonvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/28467nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/28471nvdThird Party AdvisoryVDB Entry
- securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- support.avaya.com/elmodocs2/security/ASA-2008-032.htmnvdThird Party AdvisoryVDB Entry
- www.fujitsu.com/global/support/software/security/products-f/interstage-200808e.htmlnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- www.securityfocus.com/archive/1/498523/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/505990/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/27237nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-575-1nvdThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA08-150A.htmlnvdThird Party AdvisoryUS Government Resource
- www.vupen.com/english/advisories/2008/0047nvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/0447/referencesnvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/0554nvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/0809/referencesnvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/0924/referencesnvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/0986/referencesnvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/1623/referencesnvdPermissions RequiredThird Party Advisory
- www.vupen.com/english/advisories/2008/1697nvdPermissions RequiredThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/39472nvdThird Party AdvisoryVDB Entry
- lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apple.com/archives/security-announce/2008//May/msg00001.htmlnvdMailing List
- lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlnvdMailing List
- secunia.com/advisories/28526nvdURL Repurposed
- secunia.com/advisories/28607nvdURL Repurposed
- secunia.com/advisories/28749nvdURL Repurposed
- secunia.com/advisories/28922nvdURL Repurposed
- secunia.com/advisories/28965nvdURL Repurposed
- secunia.com/advisories/28977nvdURL Repurposed
- secunia.com/advisories/29420nvdURL Repurposed
- secunia.com/advisories/29504nvdURL Repurposed
- secunia.com/advisories/29640nvdURL Repurposed
- secunia.com/advisories/29806nvdURL Repurposed
- secunia.com/advisories/29988nvdURL Repurposed
- secunia.com/advisories/30356nvdURL Repurposed
- secunia.com/advisories/30430nvdURL Repurposed
- secunia.com/advisories/30732nvdURL Repurposed
- secunia.com/advisories/31142nvdURL Repurposed
- secunia.com/advisories/32800nvdURL Repurposed
- secunia.com/advisories/33200nvdURL Repurposed
- securityreason.com/securityalert/3541nvdURL Repurposed
- slackware.com/security/viewer.phpnvdBroken Link
- sunsolve.sun.com/search/document.donvdBroken Link
- support.nortel.com/go/main.jspnvdBroken Link
- www-1.ibm.com/support/docview.wssnvdBroken Link
- www-1.ibm.com/support/docview.wssnvdBroken Link
- www-1.ibm.com/support/docview.wssnvdBroken Link
- www-1.ibm.com/support/search.wssnvdBroken Link
- www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0004.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0005.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0006.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0007.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0008.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0009.htmlnvdNot Applicable
- www.redhat.com/support/errata/RHSA-2008-0261.htmlnvdNot Applicable
- www.securityfocus.com/archive/1/488082/100/0/threadednvdBroken Link
- www.securityfocus.com/archive/1/494428/100/0/threadednvdBroken Link
- www.vupen.com/english/advisories/2008/1224/referencesnvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10272nvdBroken Link
News mentions
0No linked articles in our index yet.