angler-fishThe Vulnerability History Project

*) SECURITY: [CAN-2002-0840] HTML-escape the address produced by

      ap_server_signature() against this cross-site scripting
     vulnerability exposed by the directive 'UseCanonicalName Off'.
     Also HTML-escape the SERVER_NAME environment variable for CGI
     and SSI requests.  It's safe to escape as only the '<', '>',
     and '&' characters are affected, which won't appear in a valid
     hostname.  Reported by Matthew Murphy <mattmurphy@kc.rr.com>.
     [Brian Pane]


git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@97064 13f79535-47bb-0310-9956-ffa450edef68
    
commit 01b99447729a3d43891997806106be6bec3637ff
+2 -11
+2 -5
+1 -2
expand_less