Описание
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.4.12-2ubuntu2 |
esm-infra-legacy/trusty | released | 2.4.7-1ubuntu4.5 |
precise | not-affected | 2.2.22-1ubuntu1.9 |
trusty | released | 2.4.7-1ubuntu4.5 |
trusty/esm | released | 2.4.7-1ubuntu4.5 |
upstream | released | 2.4.16 |
utopic | ignored | end of life |
vivid | released | 2.4.10-9ubuntu1.1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
The ap_some_auth_required function in server/request.c in the Apache H ...
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
Уязвимость веб-сервера Apache HTTP Server, позволяющая нарушителю обойти существующие ограничения доступа
EPSS
4.3 Medium
CVSS2