Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-0217

Опубликовано: 01 апр. 2019
Источник: redhat
CVSS3: 7.1
EPSS Средний

Описание

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

A race condition was found in mod_auth_digest when the web server was running in a threaded MPM configuration. It could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

Отчет

Based on the the fact that digest authentication is rarely used in modern day web applications and httpd package shipped with Red Hat products do not ship threaded MPM configuration by default, this flaw has been rated as having Moderate level security impact. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This flaw has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Меры по смягчению последствий

This flaw only affects a threaded server configuration, so using the prefork MPM is an effective mitigation. In versions of httpd package shipped with Red Hat Enterprise Linux 7, the prefork MPM is the default configuration.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdOut of support scope
Red Hat Enterprise Linux 6httpdOut of support scope
Red Hat JBoss Enterprise Web Server 2httpdOut of support scope
Red Hat Virtualization 4rhvm-applianceNot affected
JBoss Core Services on RHEL 6jbcs-httpd24-aprFixedRHSA-2019:393220.11.2019
JBoss Core Services on RHEL 6jbcs-httpd24-apr-utilFixedRHSA-2019:393220.11.2019
JBoss Core Services on RHEL 6jbcs-httpd24-brotliFixedRHSA-2019:393220.11.2019
JBoss Core Services on RHEL 6jbcs-httpd24-curlFixedRHSA-2019:393220.11.2019
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2019:393220.11.2019
JBoss Core Services on RHEL 6jbcs-httpd24-janssonFixedRHSA-2019:393220.11.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1695020httpd: mod_auth_digest: access control bypass due to race condition

EPSS

Процентиль: 97%
0.43022
Средний

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
nvd
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 7.5
debian
почти 7 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition i ...

CVSS3: 7.5
github
больше 3 лет назад

In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.

CVSS3: 5.6
fstec
почти 7 лет назад

Уязвимость компонента mod_auth_digest веб-сервера Apache HTTP Server, позволяющая нарушителю проходить аутентификацию, используя другое имя пользователя

EPSS

Процентиль: 97%
0.43022
Средний

7.1 High

CVSS3