CVE-2015-3185
Published Jul 20, 2015
Last updated a year ago
Overview
- Description
- The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084" }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDC40E89-2D57-4988-913E-024BFB56B367" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FCD3C8C-9BF8-4F30-981A-593EEAEB9EDD" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "046487A3-752B-4D0F-8984-96486B828EAB" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89D2E052-51CD-4B57-A8B8-FAE51988D654" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAA27058-BACF-4F94-8E3C-7D38EC302EC1" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FEAB0DF-04A9-4F99-8666-0BADC5D642B8" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7D924D1-8A36-4C43-9E56-52814F9A6350" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFA089AB-AF28-4AE1-AE39-6D1B8192A3DF" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39CDFECC-E26D-47E0-976F-6629040B3764" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E3ECBCB1-0675-41F5-857B-438F36925F63" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB6CBFBF-74F6-42AF-BC79-AA53EA75F00B" }, { "criteria": "cpe:2.3:a:apache:http_server:2.4.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF77159D-505A-475C-A137-4F89D4769B8F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7344422F-F65A-4000-A9EF-8D323DA29011" }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.10.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8B0A12E-E122-4189-A05E-4FEA43C19876" }, { "criteria": "cpe:2.3:o:apple:mac_os_x_server:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8ACDF399-AE56-4130-8686-F8E4C9014DD9" } ], "operator": "OR" } ] } ]