Access restrictions for different authorization mechanisms may be bypassed if mod_auth_shadow is used.
vulners.com/securityvulns/securityvulns:doc:9865