CVE-2022-23943 An attacker can write to the heap memory of Apache HTTP Server to overwrite it with attacker provided data.

CVE-2022-23943 An attacker can write to the heap memory of Apache HTTP Server to overwrite it with attacker provided data.

mod_sed is a stream filter module for Apache HTTPD web server. mod_sed is used for filtering requests before they are passed to a server program, typically a CGI program. This issue results in an attacker being able to send a specially crafted request which will cause the server to attempt to write data from the request's data stream into the server's heap memory, resulting in a crash of the server. This vulnerability can be exploited by attackers with low privileged user rights. This issue only affects installations that have mod_sed enabled. With mod_sed enabled, you can get an Out-of-bounds Write in mod_sed as follows. 1. On Debian/Raspbian, edit the /etc/apache2/mods-enabled/nologin.conf file and add a new line after the '#' character like below. IfModule mod_sed_module> Filter_ passes_as_doc_stream "A HREF=\"\" data for user-agent\">" Filter_pass_through "script>alert('XSS');/script>" /IfModule> This will allow you to put HTML code in the data stream. 2. Change to the /var/www/html/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/ subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/ subdirectory/

2

. Change to the /var/www/html/subdirectory/subdirectory/subdirectory/subdirectory/ subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory/subdirectory

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe