Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-0217

Опубликовано: 08 апр. 2019
Источник: debian

Описание

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.38-3package

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-0217

  • https://svn.apache.org/r1855298

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.1
redhat
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
nvd
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
github
больше 3 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 5.6
fstec
почти 7 лет назад

Уязвимость компонента mod_auth_digest веб-сервера Apache HTTP Server, позволяющая нарушителю проходить аутентификацию, используя другое имя пользователя