Lucene search

K
gentooGentoo FoundationGLSA-201110-23
HistoryOct 25, 2011 - 12:00 a.m.

Apache mod_authnz_external: SQL injection

2011-10-2500:00:00
Gentoo Foundation
security.gentoo.org
11

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

57.6%

Background

mod_authnz_external is a tool for creating custom authentication backends for HTTP basic authentication.

Description

mysql/mysql-auth.pl in mod_authnz_external does not properly sanitize input before using it in an SQL query.

Impact

A remote attacker could exploit this vulnerability to inject arbitrary SQL statements by using a specially crafted username for HTTP authentication on a site using mod_authnz_external.

Workaround

There is no known workaround at this time.

Resolution

All Apache mod_authnz_external users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=www-apache/mod_authnz_external-3.2.6"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apache/mod_authnz_external< 3.2.6UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

57.6%