mod_ruid2 before 0.9.8 improperly handles file descriptors which allows remote attackers to bypass security using a CGI script to break out of the chroot.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2013/03/23/1 | Mailing List Third Party Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 | Third Party Advisory VDB Entry | 
| https://security-tracker.debian.org/tracker/CVE-2013-1889 | Third Party Advisory | 
| https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ | |
| http://www.openwall.com/lists/oss-security/2013/03/23/1 | Mailing List Third Party Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/83035 | Third Party Advisory VDB Entry | 
| https://security-tracker.debian.org/tracker/CVE-2013-1889 | Third Party Advisory | 
| https://sourceforge.net/p/mod-ruid/mailman/mod-ruid-announce/thread/514C503E.4020109%40users.sourceforge.net/ | 
Configurations
                    History
                    No history.
Information
                Published : 2019-11-08 16:15
Updated : 2024-11-21 01:50
NVD link : CVE-2013-1889
Mitre link : CVE-2013-1889
CVE.ORG link : CVE-2013-1889
JSON object : View
Products Affected
                mod_ruid2_project
- mod_ruid2
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
