Amazon Linux AMI : mod_wsgi (ALAS-2014-376)

high Nessus Plugin ID 78319

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system. Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

mod_wsgi allows you to host Python applications on the Apache HTTP Server. It was found that a remote attacker could leak portions of a mod_wsgi application's memory via the Content-Type header.

Solution

Run 'yum update mod_wsgi' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2014-376.html

Plugin Details

Severity: High

ID: 78319

File Name: ala_ALAS-2014-376.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/12/2014

Updated: 12/18/2019

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:mod_wsgi, p-cpe:/a:amazon:linux:mod_wsgi-debuginfo, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 9/19/2014

Vulnerability Publication Date: 5/27/2014

Reference Information

CVE: CVE-2014-0240, CVE-2014-0242

ALAS: 2014-376