Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apache <= 1.3.33 htpasswd local overflow
Information
Severity
Severity
Low
Family
Family
Privilege escalation
CVSSv2 Base
CVSSv2 Base
2.1
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:L/Au:N/C:N/I:P/A:N
Solution Type
Solution Type
Mitigation
Created
Created
18 years ago
Modified
Modified
5 years ago
Summary
The remote host appears to be running Apache 1.3.33 or older. There is a local buffer overflow in the 'htpasswd' command in these versions that may allow a local user to gain elevated privileges if 'htpasswd' is run setuid or a remote user to run arbitrary commands remotely if the script is accessible through a CGI.
Solution
Solution
Make sure htpasswd does not run setuid and is not accessible through any CGI scripts.