mod_auth_any for Apache Metacharacter Remote Command Execution

This script is Copyright (C) 2003-2014 Tenable Network Security, Inc.

Synopsis :

Arbitrary code may be run on the remote host.

Description :

The remote host seems to be running mod_auth_any, an Apache Module
which allows the use of third-party authentication programs.

This module does not properly escape shell characters when a
username is supplied, and therefore an attacker may use this module
to :
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely

See also :

Solution :

Patch mod_auth_any or disable it.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11481 ()

Bugtraq ID: 7448

CVE ID: CVE-2003-0084

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial