4.3

CVE-2014-8109

mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version2.4.1
ApacheHTTP Server Version2.4.2
ApacheHTTP Server Version2.4.3
ApacheHTTP Server Version2.4.4
ApacheHTTP Server Version2.4.6
ApacheHTTP Server Version2.4.7
ApacheHTTP Server Version2.4.9
ApacheHTTP Server Version2.4.10
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version12.04 SwEdition-
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version14.10
FedoraprojectFedora Version21
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 17.55% 0.948
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE-863 Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.

http://www.securityfocus.com/bid/73040
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1174077
Patch
Third Party Advisory
Issue Tracking