mod_auth_any for Apache Metacharacter Remote Command Execution

high Nessus Plugin ID 11481

Synopsis

Arbitrary code may be run on the remote host.

Description

The remote host seems to be running mod_auth_any, an Apache Module which allows the use of third-party authentication programs.

This module does not properly escape shell characters when a username is supplied, and therefore an attacker may use this module to :
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely

Solution

Patch mod_auth_any or disable it.

See Also

http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/mod_auth_any/files/

Plugin Details

Severity: High

ID: 11481

File Name: mod_auth_any.nasl

Version: 1.28

Type: remote

Family: Web Servers

Published: 3/26/2003

Updated: 7/14/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: www/apache

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/10/2003

Reference Information

CVE: CVE-2003-0084

BID: 7448