Files
CVEs-PoC/2012/CVE-2012-3499.md
2025-09-29 21:09:30 +02:00

43 lines
1.9 KiB
Markdown

### [CVE-2012-3499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
### POC
#### Reference
- http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DButter/whitehat_public
- https://github.com/Dmitri131313/ReconScan
- https://github.com/Dokukin1/Metasploitable
- https://github.com/Furious992/HW13-01
- https://github.com/GiJ03/ReconScan
- https://github.com/Iknowmyname/Nmap-Scans-M2
- https://github.com/MrFrozenPepe/Pentest-Cheetsheet
- https://github.com/NikulinMS/13-01-hw
- https://github.com/RoliSoft/ReconScan
- https://github.com/SecureAxom/strike
- https://github.com/Zhivarev/13-01-hw
- https://github.com/hrbrmstr/internetdb
- https://github.com/issdp/test
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/matoweb/Enumeration-Script
- https://github.com/mattfoster/vuln-checker
- https://github.com/mrt2h/DZ
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems
- https://github.com/syadg123/pigat
- https://github.com/teamssix/pigat
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
- https://github.com/xxehacker/strike
- https://github.com/zzzWTF/db-13-01