CVE-2008-1270
Lighttpd 1.4.x - mod_userdir Information Disclosure
Severity Score
7.5
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.
mod_userdir en lighttpd 1.4.18 y anteriores, cuando no está establecido el userdir.path usa un $HOME por defecto, que podría permitir a atacantes remotos leer ficheros de su elección como se ha demostrado accediendo al directorio ~nobody.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-03-10 CVE Reserved
- 2008-03-10 CVE Published
- 2008-03-12 First Exploit
- 2024-08-07 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://trac.lighttpd.net/trac/ticket/1587 | X_refsource_confirm | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106 | X_refsource_misc | |
http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany | X_refsource_confirm | |
http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/489465/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/28226 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0885/references | Vdb Entry | |
https://bugs.gentoo.org/show_bug.cgi?id=212930 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41173 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/31396 | 2008-03-12 | |
https://issues.rpath.com/browse/RPL-2344 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html | 2018-10-11 | |
http://secunia.com/advisories/29318 | 2018-10-11 | |
http://secunia.com/advisories/29403 | 2018-10-11 | |
http://secunia.com/advisories/29622 | 2018-10-11 | |
http://secunia.com/advisories/29636 | 2018-10-11 | |
http://security.gentoo.org/glsa/glsa-200804-08.xml | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1521 | 2018-10-11 |