ID CVE-2007-1743
Summary suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
CVSS
Base: 4.4 (as of 13-02-2023 - 02:17)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:L/AC:M/Au:N/C:P/I:P/A:P
refmap via4
idefense 20070411 Apache HTTPD suEXEC Multiple Vulnerabilities
mlist
  • [apache-http-dev] 20070328 Re: [Fwd: iDefense Final Notice [IDEF1445]]
  • [apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]
sectrack 1017904
statements via4
contributor Mark J Cox
lastmodified 2007-04-19
organization Red Hat
statement These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration
Last major update 13-02-2023 - 02:17
Published 13-04-2007 - 17:19
Last modified 13-02-2023 - 02:17
Back to Top