mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-8109 from the MITRE CVE dictionary dictionary and NIST NVD.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 1.9 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:N/I:P/A:N |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | None |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Software Collections 1 for Red Hat Enterprise Linux | httpd24-httpd | Will not fix |
Red Hat JBoss EWS 2 | httpd | Not affected |
Red Hat JBoss EWS 1 | httpd | Not affected |
Red Hat JBoss EAP 6 | httpd | Not affected |
Red Hat JBoss EAP 5 | httpd | Not affected |
Red Hat Enterprise Linux 7 | httpd | Will not fix |
Red Hat Enterprise Linux 6 | httpd | Not affected |
Red Hat Enterprise Linux 5 | httpd | Not affected |
Red Hat Directory Server 8 | httpd | Not affected |