CVE-2013-1889

mod_ruid2 before 0.9.8 improperly handles file descriptors which allows remote attackers to bypass security using a CGI script to break out of the chroot.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mod_ruid2_project:mod_ruid2:*:*:*:*:*:apache:*:*

History

21 Nov 2024, 01:50

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2013/03/23/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2013/03/23/1 - Mailing List, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 - Third Party Advisory, VDB Entry
References () https://security-tracker.debian.org/tracker/CVE-2013-1889 - Third Party Advisory () https://security-tracker.debian.org/tracker/CVE-2013-1889 - Third Party Advisory
References () https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ - () https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ -

07 Nov 2023, 02:14

Type Values Removed Values Added
References
  • {'url': 'https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109@users.sourceforge.net/', 'name': 'https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109@users.sourceforge.net/', 'tags': ['Release Notes'], 'refsource': 'CONFIRM'}
  • () https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ -

Information

Published : 2019-11-08 16:15

Updated : 2024-11-21 01:50


NVD link : CVE-2013-1889

Mitre link : CVE-2013-1889

CVE.ORG link : CVE-2013-1889


JSON object : View

Products Affected

mod_ruid2_project

  • mod_ruid2
CWE
CWE-20

Improper Input Validation