|
|||
Rule General Information |
---|
Release Date: | 2019-06-27 | |
Rule Name: | Apache HTTP Server RewriteLog Command Execution Vulnerability (CVE-2013-1862) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:59826 http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: http://svn.apache.org/viewvc?view=revision&revision;=r1469311 |