Family: Remote file access --> Category: infos
mod_auth_any command execution Vulnerability Scan
Vulnerability Scan Summary
Attempts to log into the remote web server
Detailed Explanation for this Vulnerability Test
The remote host seems to be running mod_auth_any, an Apache Module
which allows the use of third-party authentication programs.
This module does not properly escape shell characters when a
username is supplied, and therefore a possible hacker may use this module
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely
Solution : The freebsd team made patches, available at
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.