Apache's latest scare de jour, CAPRE DIEM, CVE-2019-0211, is a parent process privilege exploit. Since the UTMs user portal and webadmin are run on apache, apache is started by root, and the version on UTM appears to fall in the versions that are susceptible, is there any actual risk to this exploit on the UTM? A colleague expressed concern about this vulnerability and suggested disabling the portal until it was patched.
I know the exploit is more of a concern with hosts/shared hosting providers, and requires someone to execute a malicious script via the webserver, which I would think means they would need to get a file ON to the UTM, but I was wondering what the risk level was for exploits like this on the UTM. I feel like the risk on a contained system like this is minimal, but I'm always worried I'm missing something. Is there reason to be concerned for this exploit, or similar ones?
Thanks!
Adam
This thread was automatically locked due to age.