// For flags

CVE-2014-0240

mod_wsgi: possible privilege escalation in setuid() failure scenarios

Severity Score

6.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The mod_wsgi module before 3.5 for Apache, when daemon mode is enabled, does not properly handle error codes returned by setuid when run on certain Linux kernels, which allows local users to gain privileges via vectors related to the number of running processes.

El módulo mod_wsgi anterior a 3.5 para Apache, cuando modo demonio está habilitado, no maneja debidamente códigos de error devueltos por setuid cuando se ejecuta en ciertos kernels de Linux, lo que permite a usuarios locales ganar privilegios a través de vectores relacionados con el número de procesos en ejecución.

It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system.

Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-03 CVE Reserved
  • 2014-05-27 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
  • CWE-271: Privilege Dropping / Lowering Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
<= 3.4
Search vendor "Modwsgi" for product "Mod Wsgi" and version " <= 3.4"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.0
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.0"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.1
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.1"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.2
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.2"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.3
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.3"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.4
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.4"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.5
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.5"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
1.6
Search vendor "Modwsgi" for product "Mod Wsgi" and version "1.6"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.0
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.0"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.1
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.1"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.2
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.2"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.3
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.3"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.4
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.4"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.5
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.5"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.6
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.6"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.7
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.7"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
2.8
Search vendor "Modwsgi" for product "Mod Wsgi" and version "2.8"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
3.0
Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.0"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
3.1
Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.1"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
3.2
Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.2"
-
Affected
Modwsgi
Search vendor "Modwsgi"
Mod Wsgi
Search vendor "Modwsgi" for product "Mod Wsgi"
3.3
Search vendor "Modwsgi" for product "Mod Wsgi" and version "3.3"
-
Affected