/** * This is the notes section. CVE documents should ONLY be created by employees of ClearCenter with the authority to make statements on behalf of the company. If you have content that would be useful to the statement, please contact ClearCenter. */
'mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.'
This issue affects ClearOS 7. No version of ClearOS 6 was affected by this issue.
This issue occurs when the http module for lua and other versions of lua are out of phase in feature and control sets. On ClearOS, this doesn't happen since updates are generationally added.
This issue occurs when the http module for lua and other versions of lua are out of phase in feature and control sets. On ClearOS, this doesn't happen since updates are generationally added. Users who are using custom versions of lua outside of what is available from the ClearOS Marketplace and updates system are advised to consider the security implications of potentially disparate versions.
Nothing is required if using ClearOS modules from the ClearOS Marketplace. If you are using custom lua libraries, validate that all functions exist in a one to one relationship between your custom code and the coordinated libraries in ClearOS.