CVE-2008-2384

SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
References
Link Resource
http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html
http://openwall.com/lists/oss-security/2009/01/21/10
http://secunia.com/advisories/33627 Vendor Advisory
http://secunia.com/advisories/43302
http://www.redhat.com/support/errata/RHSA-2009-0259.html
http://www.redhat.com/support/errata/RHSA-2010-1002.html
http://www.securityfocus.com/bid/33392
http://www.vupen.com/english/advisories/2009/0226
http://www.vupen.com/english/advisories/2011/0367
https://bugzilla.redhat.com/show_bug.cgi?id=480238
https://exchange.xforce.ibmcloud.com/vulnerabilities/48163
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172
http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch Patch
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html
http://openwall.com/lists/oss-security/2009/01/21/10
http://secunia.com/advisories/33627 Vendor Advisory
http://secunia.com/advisories/43302
http://www.redhat.com/support/errata/RHSA-2009-0259.html
http://www.redhat.com/support/errata/RHSA-2010-1002.html
http://www.securityfocus.com/bid/33392
http://www.vupen.com/english/advisories/2009/0226
http://www.vupen.com/english/advisories/2011/0367
https://bugzilla.redhat.com/show_bug.cgi?id=480238
https://exchange.xforce.ibmcloud.com/vulnerabilities/48163
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:joey_schulze:mod_auth_mysql:*:*:*:*:*:*:*:*
OR cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:beta:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:beta:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.34:beta:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.58:*:win32:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.2:*:windows:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.3:*:windows:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch - Patch () http://klecker.debian.org/~white/mod-auth-mysql/CVE-2008-2384_mod-auth-mysql.patch - Patch
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053899.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053903.html -
References () http://openwall.com/lists/oss-security/2009/01/21/10 - () http://openwall.com/lists/oss-security/2009/01/21/10 -
References () http://secunia.com/advisories/33627 - Vendor Advisory () http://secunia.com/advisories/33627 - Vendor Advisory
References () http://secunia.com/advisories/43302 - () http://secunia.com/advisories/43302 -
References () http://www.redhat.com/support/errata/RHSA-2009-0259.html - () http://www.redhat.com/support/errata/RHSA-2009-0259.html -
References () http://www.redhat.com/support/errata/RHSA-2010-1002.html - () http://www.redhat.com/support/errata/RHSA-2010-1002.html -
References () http://www.securityfocus.com/bid/33392 - () http://www.securityfocus.com/bid/33392 -
References () http://www.vupen.com/english/advisories/2009/0226 - () http://www.vupen.com/english/advisories/2009/0226 -
References () http://www.vupen.com/english/advisories/2011/0367 - () http://www.vupen.com/english/advisories/2011/0367 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=480238 - () https://bugzilla.redhat.com/show_bug.cgi?id=480238 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/48163 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/48163 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10172 -

Information

Published : 2009-01-22 18:30

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2384

Mitre link : CVE-2008-2384

CVE.ORG link : CVE-2008-2384


JSON object : View

Products Affected

apache

  • http_server

joey_schulze

  • mod_auth_mysql
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')