cve-2007-1743
Vulnerability from cvelistv5
Published
2007-04-13 17:00
Modified
2024-08-07 13:06
Severity ?
EPSS score ?
Summary
suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because "the attacks described rely on an insecure server configuration" in which the user "has write access to the document root." In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:06:26.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070411 Apache HTTPD suEXEC Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511" }, { "name": "[apache-http-dev] 20070328 Re: [Fwd: iDefense Final Notice [IDEF1445]]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2" }, { "name": "1017904", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017904" }, { "name": "[apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because \"the attacks described rely on an insecure server configuration\" in which the user \"has write access to the document root.\" In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-03T16:14:24", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20070411 Apache HTTPD suEXEC Multiple Vulnerabilities", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511" }, { "name": "[apache-http-dev] 20070328 Re: [Fwd: iDefense Final Notice [IDEF1445]]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2" }, { "name": "1017904", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017904" }, { "name": "[apache-http-dev] 20070328 [Fwd: iDefense Final Notice [IDEF1445]]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2007-1743", "datePublished": "2007-04-13T17:00:00", "dateReserved": "2007-03-28T00:00:00", "dateUpdated": "2024-08-07T13:06:26.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F519633F-AB68-495A-B85E-FD41F9F752CA\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because \\\"the attacks described rely on an insecure server configuration\\\" in which the user \\\"has write access to the document root.\\\" In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.\"}, {\"lang\": \"es\", \"value\": \"suexec en Apache HTTP Server (httpd) 2.2.3 no verifica las combinaciones de IDs de usuario y grupo sobre la linea de comandos, lo cual podr\\u00eda ser utilizado por un usuario local para acoplar otras vulnerabilidades en la creaci\\u00f3n de sus propios ficheros UID/GID de forma aleatoria si /proc est\\u00e1 montado. NOTA: el investigador, que es creible, indica que el vendedor discuti\\u00f3 este asunto porque \\\"los ataques descritos dependen de la condiguraci\\u00f3n del servidor no segura\\\" en el que el usuario \\\"tiene permisos de escritura sobre el documento root\\\". Adem\\u00e1s, dado que esto es dependiente deotras vulnerabilidades, quiz\\u00e1s esto es el resultado y deber\\u00eda de incluirse en el CVE.\"}]", "evaluatorImpact": "From the vendor:\r\n\"The attacks described rely on an insecure server configuration - that\r\nthe unprivileged user the server runs as has write access to the\r\ndocument root. The suexec tool cannot detect all possible insecure\r\nconfigurations, nor can it protect against privilege \"escalation\" in\r\nall such cases.\r\n\r\nIt is important to note that to be able to invoke suexec, the attacker\r\nmust also first gain the ability to execute arbitrary code as the\r\nunprivileged server user.\"\r\n", "id": "CVE-2007-1743", "lastModified": "2024-11-21T00:29:03.590", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.4, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.4, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}", "published": "2007-04-13T17:19:00.000", "references": "[{\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1017904\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1017904\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "secalert@redhat.com", "vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration\", \"lastModified\": \"2007-04-19T00:00:00\"}]", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2007-1743\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-04-13T17:19:00.000\",\"lastModified\":\"2024-11-21T00:29:03.590\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because \\\"the attacks described rely on an insecure server configuration\\\" in which the user \\\"has write access to the document root.\\\" In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE.\"},{\"lang\":\"es\",\"value\":\"suexec en Apache HTTP Server (httpd) 2.2.3 no verifica las combinaciones de IDs de usuario y grupo sobre la linea de comandos, lo cual podr\u00eda ser utilizado por un usuario local para acoplar otras vulnerabilidades en la creaci\u00f3n de sus propios ficheros UID/GID de forma aleatoria si /proc est\u00e1 montado. NOTA: el investigador, que es creible, indica que el vendedor discuti\u00f3 este asunto porque \\\"los ataques descritos dependen de la condiguraci\u00f3n del servidor no segura\\\" en el que el usuario \\\"tiene permisos de escritura sobre el documento root\\\". Adem\u00e1s, dado que esto es dependiente deotras vulnerabilidades, quiz\u00e1s esto es el resultado y deber\u00eda de incluirse en el CVE.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F519633F-AB68-495A-B85E-FD41F9F752CA\"}]}]}],\"references\":[{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1017904\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=117511568709063\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=117511834512138\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1017904\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"From the vendor:\\r\\n\\\"The attacks described rely on an insecure server configuration - that\\r\\nthe unprivileged user the server runs as has write access to the\\r\\ndocument root. The suexec tool cannot detect all possible insecure\\r\\nconfigurations, nor can it protect against privilege \\\"escalation\\\" in\\r\\nall such cases.\\r\\n\\r\\nIt is important to note that to be able to invoke suexec, the attacker\\r\\nmust also first gain the ability to execute arbitrary code as the\\r\\nunprivileged server user.\\\"\\r\\n\",\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration\",\"lastModified\":\"2007-04-19T00:00:00\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.