Description
Format string vulnerability in certain third party modifications to mod_dav for logging bad gateway messages (e.g. Oracle9i Application Server 9.0.2) allows remote attackers to execute arbitrary code via a destination URI that forces a "502 Bad Gateway" response, which causes the format string specifiers to be returned from dav_lookup_uri() in mod_dav.c, which is then used in a call to ap_log_rerror().
Remediation
References
Related Vulnerabilities
WordPress Plugin Timed Content Cross-Site Scripting (2.72)
WordPress Plugin WP Font Awesome Cross-Site Scripting (1.7.8)
Joomla CVE-2022-23799 Vulnerability (CVE-2022-23799)
Mailman Other Vulnerability (CVE-2002-0855)
MODX Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2017-7324)