CVE-2008-1270
Lighttpd 1.4.x - mod_userdir Information Disclosure
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.
mod_userdir en lighttpd 1.4.18 y anteriores, cuando no está establecido el userdir.path usa un $HOME por defecto, que podría permitir a atacantes remotos leer ficheros de su elección como se ha demostrado accediendo al directorio ~nobody.
Julien Cayzax discovered that an insecure default setting exists in mod_userdir in lighttpd. When userdir.path is not set the default value used is $HOME. It should be noted that the nobody user's $HOME is / (CVE-2008-1270). An error also exists in the SSL connection code which can be triggered when a user prematurely terminates his connection (CVE-2008-1531). Versions less than 1.4.19-r2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-03-10 CVE Reserved
- 2008-03-10 CVE Published
- 2014-02-04 First Exploit
- 2024-08-07 CVE Updated
- 2025-05-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://trac.lighttpd.net/trac/ticket/1587 | X_refsource_confirm | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106 | X_refsource_misc | |
http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany | X_refsource_confirm | |
http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt | X_refsource_confirm | |
http://www.securityfocus.com/archive/1/489465/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/28226 | Vdb Entry | |
http://www.vupen.com/english/advisories/2008/0885/references | Vdb Entry | |
https://bugs.gentoo.org/show_bug.cgi?id=212930 | X_refsource_confirm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41173 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/31396 | 2014-02-04 | |
https://issues.rpath.com/browse/RPL-2344 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html | 2018-10-11 | |
http://secunia.com/advisories/29318 | 2018-10-11 | |
http://secunia.com/advisories/29403 | 2018-10-11 | |
http://secunia.com/advisories/29622 | 2018-10-11 | |
http://secunia.com/advisories/29636 | 2018-10-11 | |
http://security.gentoo.org/glsa/glsa-200804-08.xml | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1521 | 2018-10-11 |