Vulnerabilities > CVE-2004-0009 - Unspecified vulnerability in Apache-Ssl
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN apache-ssl
nessus
Summary
Apache-SSL 1.3.28+1.52 and earlier, with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth enabled, allows remote attackers to forge a client certificate by using basic authentication with the "one-line DN" of the target user.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Web Servers |
NASL id | APACHE_SSL_CERTIFICATE_FORGING.NASL |
description | The remote host is running a version of ApacheSSL that is older than 1.3.29/1.53. Such versions are reportedly vulnerable to a flaw that could allow an attacker to make the remote server forge a client certificate. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12046 |
published | 2004-02-06 |
reporter | This script is Copyright (C) 2004-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/12046 |
title | Apache-SSL SSLVerifyClient SSLFakeBasicAuth Client Certificate Forgery |
code |
|
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016870.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016870.html
- http://marc.info/?l=bugtraq&m=107619127531765&w=2
- http://marc.info/?l=bugtraq&m=107619127531765&w=2
- http://www.apache-ssl.org/advisory-20040206.txt
- http://www.apache-ssl.org/advisory-20040206.txt
- http://www.osvdb.org/3877
- http://www.osvdb.org/3877
- http://www.securityfocus.com/bid/9590
- http://www.securityfocus.com/bid/9590
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15065
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15065