mod_ruid2 before 0.9.8 improperly handles file descriptors which allows remote attackers to bypass security using a CGI script to break out of the chroot.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2013/03/23/1 | Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 | Third Party Advisory VDB Entry |
https://security-tracker.debian.org/tracker/CVE-2013-1889 | Third Party Advisory |
https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ |
Configurations
History
No history.
Information
Published : 2019-11-08 16:15
Updated : 2024-02-04 20:39
NVD link : CVE-2013-1889
Mitre link : CVE-2013-1889
CVE.ORG link : CVE-2013-1889
JSON object : View
Products Affected
mod_ruid2_project
- mod_ruid2
CWE
CWE-20
Improper Input Validation