CVE-2009-3095

N/A Unknown
Published: September 08, 2009 Modified: April 23, 2026
View on NVD

Description

The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://intevydis.com/vd-list.shtml
Source: cve@mitre.org
Broken Link
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=126998684522511&w=2
Source: cve@mitre.org
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=127557640302499&w=2
Source: cve@mitre.org
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: cve@mitre.org
Not Applicable Third Party Advisory
http://marc.info/?l=bugtraq&m=133355494609819&w=2
Source: cve@mitre.org
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/37152
Source: cve@mitre.org
Not Applicable Third Party Advisory
http://support.apple.com/kb/HT4077
Source: cve@mitre.org
Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2009-0155
Source: cve@mitre.org
Broken Link
http://www.debian.org/security/2009/dsa-1934
Source: cve@mitre.org
Third Party Advisory
http://www.securityfocus.com/archive/1/508075/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=522209
Source: cve@mitre.org
Issue Tracking Third Party Advisory
http://intevydis.com/vd-list.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=126998684522511&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=127557640302499&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=130497311408250&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Third Party Advisory
http://marc.info/?l=bugtraq&m=133355494609819&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Mailing List Third Party Advisory
http://secunia.com/advisories/37152
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable Third Party Advisory
http://support.apple.com/kb/HT4077
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2009-0155
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.debian.org/security/2009/dsa-1934
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/508075/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=522209
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8662
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9363
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

78 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
3.0%
87th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

fedoraproject apple suse opensuse debian apache