Vulnerability Details : CVE-2006-1079
htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.
Products affected by CVE-2006-1079
- cpe:2.3:a:acme_labs:thttpd:2.25b:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-1079
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 24 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1079
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2006-1079
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1079
-
http://marc.info/?l=thttpd&m=114153031201867&w=2
'[THTTPD] htpasswd.c security issues.' - MARC
-
http://www.securityfocus.com/bid/16972
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/25217
thttpd command line buffer overflow CVE-2006-1079 Vulnerability Report
-
http://marc.info/?l=thttpd&m=114154083000296&w=2
'Re: [THTTPD] htpasswd.c security issues.' - MARC
-
http://packetstormsecurity.com/files/175949/m-privacy-TightGate-Pro-Code-Execution-Insecure-Permissions.html
m-privacy TightGate-Pro Code Execution / Insecure Permissions ≈ Packet Storm
-
http://www.securityfocus.com/archive/1/426823/100/0/threaded
-
http://seclists.org/fulldisclosure/2023/Nov/13
Full Disclosure: SEC Consult SA-20231122 :: Multiple Vulnerabilities in m-privacy TightGate-Pro
-
http://www.osvdb.org/23828
404 Not Found
Jump to