CVE-2014-0240
mod_wsgi: possible privilege escalation in setuid() failure scenarios
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.
El módulo mod_wsgi anterior a 3.5 para Apache, cuando modo demonio está habilitado, no maneja debidamente códigos de error devueltos por setuid cuando se ejecuta en ciertos kernels de Linux, lo que permite a usuarios locales ganar privilegios a través de vectores relacionados con el número de procesos en ejecución.
It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system.
Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-12-03 CVE Reserved
- 2014-05-27 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-264: Permissions, Privileges, and Access Controls
- CWE-271: Privilege Dropping / Lowering Errors
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html | X_refsource_confirm | |
http://modwsgi.readthedocs.org/en/latest/release-notes/version-3.5.html | X_refsource_confirm | |
http://secunia.com/advisories/59551 | Third Party Advisory | |
http://secunia.com/advisories/60094 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2014/05/21/1 | Mailing List | |
http://www.securityfocus.com/bid/67532 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2014-0789.html | 2017-12-21 | |
https://access.redhat.com/security/cve/CVE-2014-0240 | 2014-08-25 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1101863 | 2014-08-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | <= 3.4 Search vendor "Modwsgi" for product "Mod Wsgi" and version " <= 3.4" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.0 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.0" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.1 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.1" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.2 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.2" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.3 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.3" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.4 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.4" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.5 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.5" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 1.6 Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.6" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.0 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.0" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.1 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.1" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.2 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.2" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.3 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.3" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.4 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.4" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.5 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.5" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.6 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.6" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.7 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.7" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 2.8 Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.8" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 3.0 Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.0" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 3.1 Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.1" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 3.2 Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.2" | - |
Affected
| ||||||
Modwsgi Search vendor "Modwsgi" | Mod Wsgi Search vendor "Modwsgi" for product "Mod Wsgi" | 3.3 Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.3" | - |
Affected
|