CVE-2008-2939
Description
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-site scripting vulnerability in Apache mod_proxy_ftp allows remote attackers to inject arbitrary web script via a wildcard in an FTP URI path.
Vulnerability
A cross-site scripting (XSS) vulnerability exists in the proxy_ftp.c file of the mod_proxy_ftp module in Apache HTTP Server. The flaw is triggered when a wildcard (*) is used in the last directory component of the pathname in an FTP URI. This affects Apache 2.0.63 and earlier, and Apache 2.2.9 and earlier 2.2.x versions. The module must be enabled and configured to support FTP-over-HTTP proxying for the attack to be possible [2].
Exploitation
An attacker can exploit this vulnerability by sending a specially crafted HTTP request to an Apache proxy server that includes an FTP URI containing a wildcard in the final directory component. No authentication is required, and the attack can be performed remotely. The crafted request causes the mod_proxy_ftp module to generate an error response that includes the unsanitized wildcard, leading to the injection of arbitrary HTML and script code [2].
Impact
Successful exploitation allows a remote attacker to inject arbitrary web script or HTML into the proxy server's response. This cross-site scripting (XSS) attack can be used to steal session cookies, deface web pages, or perform other malicious actions in the context of the affected proxy server's domain [1][2].
Mitigation
Apache has addressed this vulnerability in versions 2.0.64 and 2.2.10. Red Hat provided backported patches in RHSA-2008-0967 for Red Hat Enterprise Linux 3, 4, and 5 [2]. Apple included the fix in Security Update 2009-002 for Mac OS X v10.5.7 [1]. HP released updates for HP-UX Apache-based Web Server versions before v2.2.8.05 and v2.0.59.12 [3][4]. If upgrading is not immediately possible, disabling the mod_proxy_ftp module or restricting proxy access can serve as a workaround.
- About the security content of Security Update 2009-002 / Mac OS X v10.5.7 - Apple Support
- http://rhn.redhat.com/errata/RHSA-2008-0967.html
- '[security bulletin] HPSBUX02465 SSRT090192 rev.1 - HP-UX Running Apache-based Web Server, Remote Den'
- '[security bulletin] HPSBUX02401 SSRT090005 rev.1 - HP-UX Running Apache Web Server Suite, Remote Den'
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
62- lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.htmlnvdThird Party Advisory
- marc.infonvdThird Party Advisory
- marc.infonvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2008-0967.htmlnvdThird Party Advisory
- support.apple.com/kb/HT3549nvdThird Party Advisory
- svn.apache.org/viewvcnvdThird Party Advisory
- svn.apache.org/viewvcnvdThird Party Advisory
- svn.apache.org/viewvcnvdThird Party Advisory
- www-1.ibm.com/support/docview.wssnvdThird Party Advisory
- www-1.ibm.com/support/docview.wssnvdThird Party Advisory
- www.kb.cert.org/vuls/id/663763nvdThird Party AdvisoryUS Government Resource
- www.redhat.com/support/errata/RHSA-2008-0966.htmlnvdThird Party Advisory
- www.securityfocus.com/archive/1/495180/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/498566/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/archive/1/498567/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/30560nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/idnvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-731-1nvdThird Party AdvisoryVDB Entry
- www.us-cert.gov/cas/techalerts/TA09-133A.htmlnvdThird Party AdvisoryUS Government Resource
- lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3EnvdThird Party Advisory
- lists.apple.com/archives/security-announce/2009/May/msg00002.htmlnvdMailing List
- secunia.com/advisories/31384nvdBroken Link
- secunia.com/advisories/31673nvdBroken Link
- secunia.com/advisories/32685nvdBroken Link
- secunia.com/advisories/32838nvdBroken Link
- secunia.com/advisories/33156nvdBroken Link
- secunia.com/advisories/33797nvdBroken Link
- secunia.com/advisories/34219nvdBroken Link
- secunia.com/advisories/35074nvdBroken Link
- sunsolve.sun.com/search/document.donvdBroken Link
- wiki.rpath.com/Advisories:rPSA-2008-0327nvdBroken Link
- wiki.rpath.com/wiki/Advisories:rPSA-2008-0328nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.rapid7.com/advisories/R7-0033nvdBroken Link
- www.vupen.com/english/advisories/2008/2315nvdPermissions Required
- www.vupen.com/english/advisories/2008/2461nvdPermissions Required
- www.vupen.com/english/advisories/2009/0320nvdPermissions Required
- www.vupen.com/english/advisories/2009/1297nvdPermissions Required
- exchange.xforce.ibmcloud.com/vulnerabilities/44223nvdVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11316nvdBroken Link
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7716nvdBroken Link
News mentions
0No linked articles in our index yet.