CVE-2016-1000104
📋 TL;DR
This vulnerability in mod_fcgid's FcgidPassHeader Proxy allows attackers to bypass security restrictions by manipulating HTTP headers. It affects Apache servers using mod_fcgid versions before the fix, potentially enabling unauthorized access or privilege escalation.
💻 Affected Systems
- mod_fcgid
📦 What is this software?
Leap by Opensuse
Mod Fcgid by Apache
Opensuse by Opensuse
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise allowing remote code execution, data theft, or service disruption.
Likely Case
Unauthorized access to restricted resources or privilege escalation within the web application.
If Mitigated
Limited impact with proper network segmentation and minimal exposed attack surface.
🎯 Exploit Status
Exploitation requires sending specially crafted HTTP headers to vulnerable endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2016-07-07
Vendor Advisory: http://www.openwall.com/lists/oss-security/2016/07/18/6
Restart Required: Yes
Instructions:
1. Update mod_fcgid to version after 2016-07-07. 2. Restart Apache service. 3. Verify the update with version check.
🔧 Temporary Workarounds
Disable FcgidPassHeader
linuxRemove or comment out FcgidPassHeader directives in Apache configuration
# Edit Apache config (e.g., /etc/httpd/conf.d/fcgid.conf)
# Comment: #FcgidPassHeader Authorization
# Restart: systemctl restart httpd
🧯 If You Can't Patch
- Implement strict network ACLs to limit access to vulnerable servers
- Deploy WAF rules to block malicious header manipulation attempts
🔍 How to Verify
Check if Vulnerable:
Check mod_fcgid version and configuration for FcgidPassHeader usage
Check Version:
httpd -M 2>/dev/null | grep fcgid && grep -i version /path/to/mod_fcgid.so
Verify Fix Applied:
Confirm mod_fcgid version is after 2016-07-07 and test header manipulation
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP header patterns in access logs
- Failed authentication attempts with manipulated headers
Network Indicators:
- HTTP requests with abnormal header structures
- Traffic to mod_fcgid endpoints with suspicious headers
SIEM Query:
source="apache_access" AND (header="*Authorization*" OR header="*Proxy*" OR header="*Fcgid*")
🔗 References
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00084.html
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- http://www.securityfocus.com/bid/91822
- https://www.tenable.com/security/tns-2017-04
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00084.html
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- http://www.securityfocus.com/bid/91822
- https://www.tenable.com/security/tns-2017-04