aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorRemko Lodder <remko@FreeBSD.org>2005-07-28 01:01:45 +0800
committerRemko Lodder <remko@FreeBSD.org>2005-07-28 01:01:45 +0800
commit5199530afe54e1f2c1284d4ddc2e94656ef019d4 (patch)
treef224df3eb907c06aa0164e02f231529a6171fd3d /security/vuxml
parent7a52551cdfcd622933b6aa716eb756d84aa7f22b (diff)
downloadfreebsd-ports-gnome-5199530afe54e1f2c1284d4ddc2e94656ef019d4.tar.gz
freebsd-ports-gnome-5199530afe54e1f2c1284d4ddc2e94656ef019d4.tar.zst
freebsd-ports-gnome-5199530afe54e1f2c1284d4ddc2e94656ef019d4.zip
Update my latest Apache entry to make clear that this only affects certain
installations (when Apache is used as a HTTP proxy in combination with some web servers). I didn't make that clear in the first commit. Requested by: nectar Discussed with: clement
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml13
1 files changed, 12 insertions, 1 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0aa78a4179d0..49af2e876165 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -82,7 +82,18 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
ability to bypass web application firewall protection.
Exploiting this vulnerability requires multiple carefully
crafted HTTP requests, taking advantage of an caching server,
- proxy server, web application firewall etc.</p>
+ proxy server, web application firewall etc. This only affects
+ installations where Apache is used as HTTP proxy in
+ combination with the following web servers:</p>
+ <ul>
+ <il>IIS/6.0 and 5.0</il>
+ <il>Apache 2.0.45 (as web server)</il>
+ <il>apache 1.3.29</il>
+ <il>WebSphere 5.1 and 5.0</il>
+ <il>WebLogic 8.1 SP1</il>
+ <il>Oracle9iAS web server 9.0.2</il>
+ <il>SunONE web server 6.1 SP4</il>
+ </ul>
</body>
</description>
<references>