Skip to content

htpasswd, as used in Acme thttpd 2.25b and possibly other...

High severity Unreviewed Published May 1, 2022 to the GitHub Advisory Database • Updated Nov 28, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

htpasswd, as used in Acme thttpd 2.25b and possibly other products such as Apache, might allow local users to gain privileges via shell metacharacters in a command line argument, which is used in a call to the system function. NOTE: since htpasswd is normally installed as a non-setuid program, and the exploit is through command line options, perhaps this issue should not be included in CVE. However, if there are some typical or recommended configurations that use htpasswd with sudo privileges, or common products that access htpasswd remotely, then perhaps it should be included.

References

Published by the National Vulnerability Database Mar 9, 2006
Published to the GitHub Advisory Database May 1, 2022
Last updated Nov 28, 2023

Severity

High

Weaknesses

No CWEs

CVE ID

CVE-2006-1079

GHSA ID

GHSA-fmrq-6vmh-qmmf

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Checking history
See something to contribute? Suggest improvements for this vulnerability.