ID |
CVE-2007-1743
|
Summary |
suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.4 (as of 13-02-2023 - 02:17) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
refmap
via4
|
idefense | 20070411 Apache HTTPD suEXEC Multiple Vulnerabilities | mlist | - [apache-http-dev] 20070328 Re: [Fwd: iDefense Final Notice [IDEF1445]]
- [apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]
| sectrack | 1017904 |
|
statements
via4
|
contributor | Mark J Cox | lastmodified | 2007-04-19 | organization | Red Hat | statement | These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration |
|
Last major update |
13-02-2023 - 02:17 |
Published |
13-04-2007 - 17:19 |
Last modified |
13-02-2023 - 02:17 |