Apache httpd 1.1.3 apache_status vulnerability
Description: | Older versions of Apache httpd would blindly follow symlinks and overwrite files with its /tmp/apache_status file. |
Author: | Dean Gaudet (dgaudet@ARCTIC.ORG) |
Compromise: | root (local) |
Vulnerable Systems: | systems running Apache httpd v1.1.3 or lower on some architectures |
Date: | 16 February 1996 |
Exploit:
Date: Sun, 16 Feb 1997 15:28:40 +0200
From: Mihai Ibanescu
To: BUGTRAQ@NETSPACE.ORG
Subject: Bug in apache httpd 1.1.3
Hello!
I noticed something interesting on my RedHat linux system (and on
some other linuxes).
httpd creates a file /tmp/apache_status, and follows blindly any
link if /tmp/apache_status points somewhere, for instance /etc/passwd. So
one can overwrite any file in the system. If she is able to create such a
link, and I don't think that's impossible.
The funny thing is that I have apache 1.1.3 installed on a SPARC
Solaris, and the problem doesn't exist there. So am I paranoid, or is
there a problem in the Apache server?
Misa
Department of Computer Science Mihai Ibanescu
"Al. I. Cuza" Univ. of Iasi e-mail: misa@infoiasi.ro
Romania http://www.infoiasi.ro/~misa
The master index of all exploits is available
here (Very large file)
Or you can pick your favorite operating system:
This page is part of Fyodor's exploit
world.
For a free program to automate scanning your network for vulnerable
hosts and services, check out my network mapping tool, nmap. Or try these Insecure.Org resources: