K 10 svn:author V 5 lioux K 8 svn:date V 27 2003-03-25T04:23:11.000000Z K 7 svn:log V 1086 o Fix vulnerability that allows execution of arbitrary commands on the server with the uid of the apache process. Background [1]: "The module accepts a username and password from the web client, passes them to a user-space executable (using popen(3), which invokes a shell) and waits for a response in order to authenticate the user. The password is quoted on the popen() command line to avoid interpretation of shell special chars, but the username is not. Thus a malicious user can execute commands by supplying an appropriately crafted username. (e.g. "foo&mail me@my.home [1] Obtained from: mod_auth_any CVS [2], nalin@redhat.com [3] END