|
Family: Remote file access --> Category: infos
mod_auth_any command execution Vulnerability Scan
Vulnerability Scan Summary Attempts to log into the remote web server
Detailed Explanation for this Vulnerability Test
The remote host seems to be running mod_auth_any, an Apache Module
which allows the use of third-party authentication programs.
This module does not properly escape shell characters when a
username is supplied, and therefore a possible hacker may use this module
to :
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely
Solution : The freebsd team made patches, available at
http://www.freebsd.org/cgi/cvsweb.cgi/ports/www/mod_auth_any/files/
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|