Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q29r-xr2f-g7j5

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

Ссылки

EPSS

Процентиль: 97%
0.43022
Средний

7.5 High

CVSS3

Дефекты

CWE-362

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.1
redhat
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
nvd
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
debian
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition i ...

CVSS3: 5.6
fstec
почти 7 лет назад

Уязвимость компонента mod_auth_digest веб-сервера Apache HTTP Server, позволяющая нарушителю проходить аутентификацию, используя другое имя пользователя

EPSS

Процентиль: 97%
0.43022
Средний

7.5 High

CVSS3

Дефекты

CWE-362