Apache mod_authnz_external: SQL injection — GLSA 201110-23

An input sanitation flaw in mod_authnz_external allows remote attacker to conduct SQL injection.

Affected packages

www-apache/mod_authnz_external on all architectures
Affected versions < 3.2.6
Unaffected versions >= 3.2.6

Background

mod_authnz_external is a tool for creating custom authentication backends for HTTP basic authentication.

Description

mysql/mysql-auth.pl in mod_authnz_external does not properly sanitize input before using it in an SQL query.

Impact

A remote attacker could exploit this vulnerability to inject arbitrary SQL statements by using a specially crafted username for HTTP authentication on a site using mod_authnz_external.

Workaround

There is no known workaround at this time.

Resolution

All Apache mod_authnz_external users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose
 ">=www-apache/mod_authnz_external-3.2.6"
 

References

Release date
October 25, 2011

Latest revision
October 25, 2011: 1

Severity
low

Exploitable
remote

Bugzilla entries