Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-6514Sensitive Information Exposure in Apache Http Server

Severity
4.3MEDIUMNVD
EPSS
9.7%
top 7.07%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 21
Latest updateMay 1

Description

Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.

CVSS vector

AV:N/AC:M/C:P/I:N/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-49v2-h77h-w34h: Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed c2022-05-01
CVEList
CVE-2007-6514: Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed c2007-12-21

💥Exploits & PoCs

1
Exploit-DB
Apache 2.2.6 (Windows) - Share PHP File Extension Mapping Information Disclosure2007-12-19

📋Vendor Advisories

2
Red Hat
compiz-fusion: Possible locked desktop access by using Expo plugin mouse shortcuts2008-07-09
Red Hat
When document is on smbfs, a trailing backslash at the end of file name bypasses content type match2007-12-19

💬Community

2
Bugzilla
CVE-2008-6514 compiz-fusion: Possible locked desktop access by using Expo plugin mouse shortcuts2009-03-24
Bugzilla
CVE-2007-6514 When document is on smbfs, a trailing backslash at the end of file name bypasses content type match2007-12-21
CVE-2007-6514 — Sensitive Information Exposure | cvebase