- Home
- CVEs with nessus.description==It was found that mod_wsgi did not properly drop privileges if the
call to setuid() failed. If mod_wsgi was set up to allow unprivileged
users to run WSGI applications, a local user able to run a WSGI
application could possibly use this flaw to escalate their privileges
on the system. Note: mod_wsgi is not intended to provide privilege
separation for WSGI applications. Systems relying on mod_wsgi to limit
or sandbox the privileges of mod_wsgi applications should migrate to a
different solution with proper privilege separation.
mod_wsgi allows you to host Python applications on the Apache HTTP
Server. It was found that a remote attacker could leak portions of a
mod_wsgi application's memory via the Content-Type header.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top