|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200502-21] lighttpd: Script source disclosure Vulnerability Scan
Vulnerability Scan Summary lighttpd: Script source disclosure
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200502-21
(lighttpd: Script source disclosure)
lighttpd uses file extensions to acertain which elements are
programs that should be executed and which are static pages that should
be sent as-is. By appending %00 to the filename, you can evade the
extension detection mechanism while still accessing the file.
Impact
A remote attacker could send specific queries and access the
source of scripts that should have been executed as CGI or FastCGI
applications.
Workaround
There is no known workaround at this time.
References:
http://article.gmane.org/gmane.comp.web.lighttpd/1171
Solution:
All lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1"
Threat Level: Low
Click HERE for more information and discussions on this network vulnerability scan.
|