The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. References: http://intevydis.com/vd-list.shtml
This issue affects httpd 2.0.x versions as shipped in Red Hat Enterprise Linux 3 and 4 (older 2.0.x version may be affected too), and httpd 2.2.x up to the current upstream version 2.2.13 and hence including versions shipped in Red Hat Enterprise Linux 5, Red Hat Application Stack v2 and JBoss Enterprise Web Server. This issue has very limited impact. It allows attacker to inject FTP commands via Authorization HTTP header. Commands can be embedded as part of user name or password. Injecting commands as part of the user name will not give attacker any extra privileges on the proxied-to FTP server, as those commands will be processed by the server before the authentication is finished and hence are unlikely to trigger anything but an authentication error. When trying to inject FTP commands as part of the password, command may be executed post-authentication if an attacker knows the right password. Commands will be executed on behalf of the authenticated FTP user. Hence no trust boundary is crossed, at attacker can do the same (and more) via direct connection to the FTP server. This was rated as having low security impact. Future httpd updates may address this flaw. We do not currently plan to release updates to only address this flaw. Upstream commit: http://svn.apache.org/viewvc?view=rev&revision=814045
This issue has been addressed in following products: Red Hat Web Application Stack for RHEL 5 Via RHSA-2009:1461 https://rhn.redhat.com/errata/RHSA-2009-1461.html
Issue was fixed in upstream Apache httpd 2.2.14-dev version: http://httpd.apache.org/security/vulnerabilities_22.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2009:1580 https://rhn.redhat.com/errata/RHSA-2009-1580.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 3 Via RHSA-2009:1579 https://rhn.redhat.com/errata/RHSA-2009-1579.html
httpd-2.2.14-1.fc11 has been submitted as an update for Fedora 11. http://admin.fedoraproject.org/updates/httpd-2.2.14-1.fc11
httpd-2.2.14-1.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/httpd-2.2.14-1.fc10
httpd-2.2.14-1.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
httpd-2.2.14-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: JBEWS 1.0.0 for RHEL 4 JBEWS 1.0.0 for RHEL 5 Via RHSA-2010:0011 https://rhn.redhat.com/errata/RHSA-2010-0011.html
httpd-2.2.14-1.fc11 has been pushed to the Fedora 11 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Certificate System 7.3 Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html