bozotic HTTP server (aka bozohttpd) before 20140708, as used in NetBSD, truncates paths when checking .htpasswd restrictions, which allows remote attackers to bypass the HTTP authentication scheme and access restrictions via a long path.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 02:11
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-007.txt.asc - Vendor Advisory | |
| References | () http://seclists.org/oss-sec/2014/q3/180 - | |
| References | () http://www.eterna.com.au/bozohttpd/ - Patch | |
| References | () http://www.eterna.com.au/bozohttpd/CHANGES - | |
| References | () http://www.osvdb.org/109283 - | |
| References | () http://www.securityfocus.com/bid/68752 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/94751 - | 
Information
                Published : 2014-07-24 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-5015
Mitre link : CVE-2014-5015
CVE.ORG link : CVE-2014-5015
JSON object : View
Products Affected
                eterna
- bozohttpd
netbsd
- netbsd
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
