Apache <= 2.0.51 Satisfy Directive Access Control Bypass

high Nessus Plugin ID 14803

Synopsis

The remote web server is affected by an access control bypass vulnerability.

Description

The remote host is running Apache web server 2.0.51. It is reported that this version of Apache is vulnerable to an access control bypass attack. This issue occurs when using the 'Satisfy' directive. An attacker may gain unauthorized access to restricted resources if access control relies on this directive.

Solution

Upgrade to Apache web server 2.0.52 or later.

Plugin Details

Severity: High

ID: 14803

File Name: apache_2_0_52.nasl

Version: 1.26

Type: remote

Family: Web Servers

Published: 9/23/2004

Updated: 6/29/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 9/23/2004

Reference Information

CVE: CVE-2004-0811

BID: 11239

Secunia: 12633, 12641, 13025