CVE-2014-0240

Public on 2014-05-27
Modified on 2014-09-19
Description
It was found that mod_wsgi did not properly drop privileges if the call to setuid() failed. If mod_wsgi was set up to allow unprivileged users to run WSGI applications, a local user able to run a WSGI application could possibly use this flaw to escalate their privileges on the system.

Note: mod_wsgi is not intended to provide privilege separation for WSGI applications. Systems relying on mod_wsgi to limit or sandbox the privileges of mod_wsgi applications should migrate to a different solution with proper privilege separation.
Severity
Important severity
Important
See what this means
CVSS v3 Base Score
6.9
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 mod24_wsgi 2014-07-09 ALAS-2014-375 Fixed
Amazon Linux 1 mod_wsgi 2014-07-09 ALAS-2014-376 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv2 6.9 AV:L/AC:M/Au:N/C:C/I:C/A:C
NVD CVSSv2 6.2 AV:L/AC:H/Au:N/C:C/I:C/A:C