mod_ruid2 before 0.9.8 improperly handles file descriptors which allows remote attackers to bypass security using a CGI script to break out of the chroot.
References
Link | Resource |
---|---|
https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109@users.sourceforge.net/ | Release Notes |
https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 | Third Party Advisory VDB Entry |
https://security-tracker.debian.org/tracker/CVE-2013-1889 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2013/03/23/1 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2019-11-08 08:15
Updated : 2019-11-13 11:47
NVD link : CVE-2013-1889
Mitre link : CVE-2013-1889
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
mod_ruid2_project
- mod_ruid2