Apache htpasswd Overflow

medium Nessus Network Monitor Plugin ID 2940

Synopsis

The remote web server could potentially allow remote attackers to manipulate the password database.

Description

The remote host appears to be running a version of Apache, an open source web server. This version of Apache is vulnerable to a flaw in the 'htpasswd' utility. This issue is not considered a local flaw, as the program is not run setuid. An attacker exploiting this flaw would need to find a vulnerable Apache Web server that was making a call to 'htpasswd' via a CGI script.

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://archives.neohapsis.com/archives/bugtraq/2004-10/0345.html

http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0547.html

http://www.apache.org

Plugin Details

Severity: Medium

ID: 2940

Family: Web Servers

Published: 5/26/2005

Updated: 3/6/2019

Nessus ID: 14771

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 4.3

Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:apache:http_server

Reference Information

BID: 13777, 13778