// For flags

CVE-2013-4566

mod_nss: incorrect handling of NSSVerifyClient in directory context

Severity Score

4.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

mod_nss 1.0.8 and earlier, when NSSVerifyClient is set to none for the server/vhost context, does not enforce the NSSVerifyClient setting in the directory context, which allows remote attackers to bypass intended access restrictions.

mod_nss 1.0.8 y anteriores versiones, cuando se establece NSSVerifyClient en none para el contexto del server/vhost, no aplica la opciĆ³n de NSSVerifyClient en el contexto de directorio, lo que permite a atacantes remotos evadir restricciones de acceso intencionadas.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-06-12 CVE Reserved
  • 2013-12-04 CVE Published
  • 2024-08-06 CVE Updated
  • 2024-11-01 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
<= 1.0.8
Search vendor "Mod Nss Project" for product "Mod Nss" and version " <= 1.0.8"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.2
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.2"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.3
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.3"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.4
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.4"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.5
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.5"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.6
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.6"
-
Affected
Mod Nss Project
Search vendor "Mod Nss Project"
Mod Nss
Search vendor "Mod Nss Project" for product "Mod Nss"
1.0.7
Search vendor "Mod Nss Project" for product "Mod Nss" and version "1.0.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
5
Search vendor "Redhat" for product "Enterprise Linux" and version "5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
6.0
Search vendor "Redhat" for product "Enterprise Linux" and version "6.0"
-
Affected