cvelist/2014/8xxx/CVE-2014-8109.json

123 lines
4.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2014-8109",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[oss-security] 20141128 CVE Request: \"LuaAuthzProvider\" in Apache HTTP Server mixes up arguments",
"refsource" : "MLIST",
2017-10-16 12:31:07 -04:00
"url" : "http://www.openwall.com/lists/oss-security/2014/11/28/5"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1174077",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1174077"
},
{
"name" : "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb"
},
{
"name" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=57204",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://issues.apache.org/bugzilla/show_bug.cgi?id=57204"
},
{
"name" : "http://advisories.mageia.org/MGASA-2015-0011.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://advisories.mageia.org/MGASA-2015-0011.html"
},
{
"name" : "https://support.apple.com/kb/HT205031",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://support.apple.com/kb/HT205031"
},
{
"name" : "https://support.apple.com/HT205219",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "https://support.apple.com/HT205219"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"
},
{
"name" : "APPLE-SA-2015-08-13-2",
"refsource" : "APPLE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html"
},
{
"name" : "APPLE-SA-2015-09-16-4",
"refsource" : "APPLE",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html"
},
{
"name" : "FEDORA-2015-9216",
"refsource" : "FEDORA",
2017-10-16 12:31:07 -04:00
"url" : "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159352.html"
},
{
"name" : "USN-2523-1",
"refsource" : "UBUNTU",
2017-10-16 12:31:07 -04:00
"url" : "http://www.ubuntu.com/usn/USN-2523-1"
},
{
"name" : "73040",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/73040"
}
]
}
}