bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-007.txt.asc - Vendor Advisory | |
References | () http://seclists.org/oss-sec/2014/q3/180 - | |
References | () http://www.eterna.com.au/bozohttpd/ - Patch | |
References | () http://www.eterna.com.au/bozohttpd/CHANGES - | |
References | () http://www.osvdb.org/109283 - | |
References | () http://www.securityfocus.com/bid/68752 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/94751 - |
Information
Published : 2014-07-24 14:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5015
Mitre link : CVE-2014-5015
CVE.ORG link : CVE-2014-5015
JSON object : View
Products Affected
netbsd
- netbsd
eterna
- bozohttpd
CWE
CWE-264
Permissions, Privileges, and Access Controls