VYPR
Unrated severityNVD Advisory· Published Jan 25, 2008· Updated Apr 23, 2026

CVE-2008-0455

CVE-2008-0455

Description

Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

XSS in Apache HTTP Server's mod_negotiation; a crafted filename can inject script into 406/300 error responses.

Vulnerability

A cross-site scripting (XSS) vulnerability exists in the mod_negotiation module of Apache HTTP Server versions 2.2.6 and earlier (2.2.x series), 2.0.61 and earlier (2.0.x series), and 1.3.39 and earlier (1.3.x series). When a remote authenticated user uploads a file whose name contains XSS sequences and a file extension, and another user requests the file without the extension, the server may return a 406 Not Acceptable or 300 Multiple Choices HTTP response that reflects the malicious filename, injecting arbitrary web script or HTML.

Exploitation

An attacker must have valid credentials to upload a file to a location served by Apache with mod_negotiation enabled. The attacker uploads a file with a name such as .txt. When a victim requests the file without the extension (e.g., /path/), the server's negotiation process triggers a 406 or 300 response that includes the unsanitized filename in the HTTP body, causing the browser to execute the injected script.

Impact

Successful exploitation allows an attacker to inject arbitrary web script or HTML into the response page. This can lead to session hijacking, credential theft, or defacement, all within the security context of the affected Apache server domain. The attack requires the victim to visit a crafted URL and the server to have mod_negotiation enabled.

Mitigation

Apache HTTP Server versions 2.2.7, 2.0.62, and 1.3.40 contain patches that properly sanitize filenames in negotiation responses. Users should upgrade to these or later versions. Workarounds include disabling mod_negotiation if not required, or restricting file upload capabilities for authenticated users. No mention of this CVE in the provided Red Hat advisories [1][2][3][4] indicates that patches were shipped separately.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

7
  • cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*range: >=2.2.0,<2.2.23
    • (no CPE)range: 2.2.6 and earlier in 2.2.x, 2.0.61 and earlier in 2.0.x, 1.3.39 and earlier in 1.3.x
  • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
  • cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

26

News mentions

0

No linked articles in our index yet.