Apache – CVE-2015-3185

Description

Kayran has detected that the Version of Apache HTTP Server being used has the ‘ap_some_auth_required API unusable’ vulnerability.
CVE-2015-3185 is categorized as a ‘Permissions, Privileges, and Access Controls’ vulnerability (CWE-264).

Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

The ap_some_auth_required function in server/request.c in the version of Apache being used does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting.
That allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

There’s a chance that this vulnerability will allow attackers to modify system files and information.

Recommendation

To fix CVE-2015-3185, upgrade the version of Apache HTTP Server being used to 2.4.16.

References

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185

https://cwe.mitre.org/data/definitions/264.html

< Return to all Vulnerabilities

Man-In-The-Middle Attacks

Do you know these people who just push themselves into conversations?That’s Man-In-The-Middle Attacks. And from a wider angle, Man-In-The-Middle Attacks, or MITM, are built around

Read More »

What is a CWE ?

Similar to the article written on CVEs, in this article we will answer the questions :What is CWE ? and, what is the difference between

Read More »

Blue Team

We’ve talked about The Red Team before, but what about The Blue Team? How is this group different from the red one? Why would we

Read More »

Bug Bounties

As pirates, we all love plundering, we all love raiding, but mostly, we all love bounties, especially Bug Bounties. Let’s talk about it. Bug Bounties

Read More »