CVE-2011-4973
📋 TL;DR
CVE-2011-4973 is an authentication bypass vulnerability in mod_nss 1.0.8 where remote attackers can impersonate valid users by presenting their certificate and using 'password' as the password. This affects systems using mod_nss for client certificate authentication with Apache web servers. The vulnerability allows complete authentication bypass without needing the actual user's password.
💻 Affected Systems
- mod_nss
📦 What is this software?
Mod Nss by Mod Nss Project
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of authenticated web applications, unauthorized access to sensitive data, and potential privilege escalation to administrative functions.
Likely Case
Unauthorized access to web applications protected by client certificate authentication, potentially exposing confidential information and performing unauthorized actions.
If Mitigated
Limited impact with proper network segmentation, additional authentication layers, and monitoring for suspicious authentication attempts.
🎯 Exploit Status
Exploitation requires obtaining a valid user certificate and using 'password' as the password. The vulnerability is simple to exploit once a valid certificate is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: mod_nss 1.0.9 and later
Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=1017197
Restart Required: Yes
Instructions:
1. Update mod_nss to version 1.0.9 or later using your distribution's package manager. 2. For Red Hat-based systems: 'yum update mod_nss'. 3. Restart Apache web server: 'systemctl restart httpd' or 'service httpd restart'.
🔧 Temporary Workarounds
Disable mod_nss client certificate authentication
linuxTemporarily disable client certificate authentication until patching is possible
Comment out or remove NSSVerifyClient require directives in Apache configuration
Implement additional authentication layer
linuxAdd secondary authentication method (username/password) alongside certificates
Configure Apache to require both client certificates and basic/digest authentication
🧯 If You Can't Patch
- Implement network segmentation to restrict access to affected systems
- Enable detailed logging of authentication attempts and monitor for use of 'password' as password
🔍 How to Verify
Check if Vulnerable:
Check mod_nss version: 'rpm -q mod_nss' or 'mod_nss --version'. If version is 1.0.8 and client certificate authentication is enabled, system is vulnerable.
Check Version:
rpm -q mod_nss
Verify Fix Applied:
Verify mod_nss version is 1.0.9 or later: 'rpm -q mod_nss' should show version 1.0.9+. Test authentication with valid certificate and 'password' as password - should be rejected.
📡 Detection & Monitoring
Log Indicators:
- Authentication attempts using 'password' as password with valid certificates
- Successful authentications with suspicious patterns
Network Indicators:
- Unusual authentication patterns from external sources
- Multiple failed authentication attempts followed by success with 'password'
SIEM Query:
source="apache_access.log" AND "password" AND cert_validation=success