CVE-2008-4360
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
mod_userdir de lighttpd versiones anteriores a v1.4.20, cuando un sistema operativo insensible a mayúsculas o minúsculas o sistemas de ficheros son utilizados, realiza comparaciones entre mayúsculas y minúsculas en componentes de nombres de ficheros en las opciones de configuración, lo cual puede permitir a atacantes remotos evitar restricciones de acceso intencionadas, como lo demostrado por un fichero .PHP cuando hay una regla de configuración de ficheros .php.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-09-30 CVE Reserved
- 2008-10-03 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://openwall.com/lists/oss-security/2008/09/30/1 | Mailing List | |
http://openwall.com/lists/oss-security/2008/09/30/2 | Mailing List | |
http://openwall.com/lists/oss-security/2008/09/30/3 | Mailing List | |
http://secunia.com/advisories/32069 | Third Party Advisory | |
http://secunia.com/advisories/32132 | Third Party Advisory | |
http://secunia.com/advisories/32480 | Third Party Advisory | |
http://secunia.com/advisories/32834 | Third Party Advisory | |
http://secunia.com/advisories/32972 | Third Party Advisory | |
http://wiki.rpath.com/Advisories:rPSA-2008-0309 | Third Party Advisory | |
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0309 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/497932/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/31600 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2008/2741 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/45689 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://trac.lighttpd.net/trac/ticket/1589 | 2018-11-29 | |
http://www.lighttpd.net/security/lighttpd-1.4.x_userdir_lowercase.patch | 2018-11-29 | |
http://www.lighttpd.net/security/lighttpd_sa_2008_06.txt | 2018-11-29 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html | 2018-11-29 | |
http://security.gentoo.org/glsa/glsa-200812-04.xml | 2018-11-29 | |
http://trac.lighttpd.net/trac/changeset/2283 | 2018-11-29 | |
http://trac.lighttpd.net/trac/changeset/2308 | 2018-11-29 | |
http://www.debian.org/security/2008/dsa-1645 | 2018-11-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Lighttpd Search vendor "Lighttpd" | Lighttpd Search vendor "Lighttpd" for product "Lighttpd" | < 1.4.20 Search vendor "Lighttpd" for product "Lighttpd" and version " < 1.4.20" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 4.0 Search vendor "Debian" for product "Debian Linux" and version "4.0" | - |
Affected
|