Apache Web Server Bug Grants Root Access On Shared Hosting Environments

Apache Web Server Bug Grants Root Access On Shared Hosting Environments
0

#1

This week, the Apache Software Foundation has patched a severe vulnerability in the Apache (httpd) web server project that could --under certain circumstances-- allow rogue server scripts to execute code with root privileges and take over the underlying server. The vulnerability, tracked as CVE-2019-0211, affects Apache web server releases for Unix systems only, from 2.4.17 to 2.4.38, and was fixed this week with the release of version 2.4.39. According to the Apache team, less-privileged Apache child processes (such as CGI scripts) can execute malicious code with the privileges of the parent process. Because on most Unix systems Apache httpd runs under the root user, any threat actor who has planted a malicious CGI script on an Apache server can use CVE-2019-0211 to take over the underlying system running the Apache httpd process, and inherently control the entire machine.

“First of all, it is a LOCAL vulnerability, which means you need to have some kind of access to the server,” Charles Fol, the security researcher who discovered this vulnerability told ZDNet in an interview yesterday. This means that attackers either have to register accounts with shared hosting providers or compromise existing accounts. Once this happens, the attacker only needs to upload a malicious CGI script through their rented/compromised server’s control panel to take control of the hosting provider’s server to plant malware or steal data from other customers who have data stored on the same machine. “The web hoster has total access to the server through the ‘root’ account. If one of the users successfully exploits the vulnerability I reported, he/she will get full access to the server, just like the web hoster,” Fol said. “This implies read/write/delete any file/database of the other clients.”