FreeBSD Port: apache-2.0.63_2

Matt Tourtillott matt at
Sun Nov 23 19:16:06 PST 2008

Hello Clement,

I am running a FreeBSD 7.0 64bit server with apache 2.0.63_2 port 
installed and the server is failing a PCI compliance issue with apache.

This is what they are saying

Synopsis : The remote web server is vulnerable to a cross-site scripting 
attack. Description : The mod_proxy_ftp module in the version of Apache 
installed on the remote host fails to properly sanitize user-supplied 
URL input before using it to generate dynamic HTML output. Using 
specially crafted requests for FTP URLs with globbing characters (such 
as asterisk, tilde, opening square bracket, etc), an attacker may be 
able to leverage this issue to inject arbitrary HTML and script code 
into a user's browser to be executed within the security context of the 
affected site. See also : 95180/100/0/threaded 
<> _2.2.10 
<> bilities_22.html 
<> *Solution*: 
Either disable the affected module or upgrade to Apache version 2.2.10 
or later. *Risk Factor*: Medium  / CVSS Base Score : 4.3 
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N) CVE : CVE-2008-2939 BID : 30560 Other 
references : OSVDB:47474

I don't even have this module installed.  Do you know when 2.0.64 will 
be available in the ports tree or have any other suggestion that will 
help solve this issue?

Thanks,  Matt
MarkeTrends, inc.



More information about the freebsd-ports mailing list