Bug 1075703 (CVE-2014-2323, CVE-2014-2324)

Summary: CVE-2014-2323 CVE-2014-2324 lighttpd: SQL injection and directory traversal vulnerabilities
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apmukher, ccoleman, dmcphers, gwync, jialiu, lmeyer, mmcgrath
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-05-20 21:15:23 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1075710, 1075711, Red Hat1075712    
Bug Blocks:    

Description Martin Prpič 2014-03-12 15:53:58 UTC
It was reported [1] that lighttpd's mod_mysql_vhost module is vulnerable to SQL injection attacks (CVE-2014-2323), and the mod_evhost or mod_simple_vhost modules are vulnerable to directory traversal attacks (CVE-2014-2324). More information can be found at [2].

This issue has been fixed in version 1.4.35 of lighttpd [3], and the patch is available at [4].

A workaround for this issue exists:

* Disable the mod_mysql_vhost module.
* Do not use the mod_evhost or mod_simple_vhost modules for IPv6 addresses as host names (i.e. don't have and don't allow creation of "[...]" directories in the base directories).

[1] http://seclists.org/oss-sec/2014/q1/561
[2] http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
[3] http://www.lighttpd.net/2014/3/12/1.4.35/
[4] http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.34_fix_mysql_injection.patch

Comment 2 Martin Prpič 2014-03-12 16:05:51 UTC
Created lighttpd tracking bugs for this issue:

Affects: fedora-all [bug 1075710]
Affects: epel-all [bug 1075711]

Comment 3 Product Security DevOps Team 2020-05-20 21:15:23 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.