Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F519633F-AB68-495A-B85E-FD41F9F752CA", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "suexec in Apache HTTP Server (httpd) 2.2.3 does not verify combinations of user and group IDs on the command line, which might allow local users to leverage other vulnerabilities to create arbitrary UID/GID owned files if /proc is mounted. NOTE: the researcher, who is reliable, claims that the vendor disputes the issue because \"the attacks described rely on an insecure server configuration\" in which the user \"has write access to the document root.\" In addition, because this is dependent on other vulnerabilities, perhaps this is resultant and should not be included in CVE."}, {"lang": "es", "value": "suexec en Apache HTTP Server (httpd) 2.2.3 no verifica las combinaciones de IDs de usuario y grupo sobre la linea de comandos, lo cual podr\u00eda ser utilizado por un usuario local para acoplar otras vulnerabilidades en la creaci\u00f3n de sus propios ficheros UID/GID de forma aleatoria si /proc est\u00e1 montado. NOTA: el investigador, que es creible, indica que el vendedor discuti\u00f3 este asunto porque \"los ataques descritos dependen de la condiguraci\u00f3n del servidor no segura\" en el que el usuario \"tiene permisos de escritura sobre el documento root\". Adem\u00e1s, dado que esto es dependiente deotras vulnerabilidades, quiz\u00e1s esto es el resultado y deber\u00eda de incluirse en el CVE."}], "evaluatorImpact": "From the vendor:\r\n\"The attacks described rely on an insecure server configuration - that\r\nthe unprivileged user the server runs as has write access to the\r\ndocument root. The suexec tool cannot detect all possible insecure\r\nconfigurations, nor can it protect against privilege \"escalation\" in\r\nall such cases.\r\n\r\nIt is important to note that to be able to invoke suexec, the attacker\r\nmust also first gain the ability to execute arbitrary code as the\r\nunprivileged server user.\"\r\n", "id": "CVE-2007-1743", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2007-04-13T17:19:00.000", "references": [{"source": "secalert@redhat.com", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511"}, {"source": "secalert@redhat.com", "url": "http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2"}, {"source": "secalert@redhat.com", "url": "http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2"}, {"source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1017904"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=511"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=apache-httpd-dev&m=117511568709063&w=2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=apache-httpd-dev&m=117511834512138&w=2"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017904"}], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [{"comment": "These attacks are reliant on an insecure configuration of the server - that the user the server runs as has write access to the document root. The suexec security model is not intented to protect against privilege escalation in such a configuration", "lastModified": "2007-04-19T00:00:00", "organization": "Red Hat"}], "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}