Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apache mod_include privilege escalation
Information
Severity
Severity
Medium
Family
Family
Web Servers
CVSSv2 Base
CVSSv2 Base
6.9
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:M/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
18 years ago
Modified
Modified
5 years ago
Summary
The remote web server appears to be running a version of Apache that is older than version 1.3.33.
Insight
Insight
This version is vulnerable to a local buffer overflow in the get_tag() function of the module 'mod_include' when a specially crafted document with malformed server-side includes is requested though an HTTP session.
Solution
Solution
Disable SSI or upgrade to a newer version when available.