Executive Summary

Informations
Name CVE-2008-1270 First vendor Publication 2008-03-10
Vendor Cve Last vendor Modification 2018-10-11

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1270

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-200 Information Exposure

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20349
 
Oval ID: oval:org.mitre.oval:def:20349
Title: DSA-1521-1 lighttpd - arbitrary file disclosure
Description: Julien Cayzac discovered that under certain circumstances lighttpd, a fast webserver with minimal memory footprint, might allow the reading of arbitrary files from the system. This problem could only occur with a non-standard configuration.
Family: unix Class: patch
Reference(s): DSA-1521-1
CVE-2008-1270
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): lighttpd
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7897
 
Oval ID: oval:org.mitre.oval:def:7897
Title: DSA-1521 lighttpd -- file disclosure
Description: Julien Cayzac discovered that under certain circumstances lighttpd, a fast webserver with minimal memory footprint, might allow the reading of arbitrary files from the system. This problem could only occur with a non-standard configuration.
Family: unix Class: patch
Reference(s): DSA-1521
CVE-2008-1270
Version: 3
Platform(s): Debian GNU/Linux 4.0
Product(s): lighttpd
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 58

OpenVAS Exploits

Date Description
2008-09-24 Name : Gentoo Security Advisory GLSA 200804-08 (lighttpd)
File : nvt/glsa_200804_08.nasl
2008-03-19 Name : Debian Security Advisory DSA 1521-1 (lighttpd)
File : nvt/deb_1521_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
43170 lighttpd mod_userdir userdir.path Information Disclosure

Nessus® Vulnerability Scanner

Date Description
2018-02-06 Name : The remote web server is affected by multiple vulnerabilities
File : lighttpd_1_4_19.nasl - Type : ACT_GATHER_INFO
2008-04-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-200804-08.nasl - Type : ACT_GATHER_INFO
2008-04-04 Name : The remote openSUSE host is missing a security update.
File : suse_lighttpd-5107.nasl - Type : ACT_GATHER_INFO
2008-03-17 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1521.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/28226
BUGTRAQ http://www.securityfocus.com/archive/1/489465/100/0/threaded
CONFIRM http://trac.lighttpd.net/trac/ticket/1587
http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany
http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt
https://bugs.gentoo.org/show_bug.cgi?id=212930
https://issues.rpath.com/browse/RPL-2344
DEBIAN http://www.debian.org/security/2008/dsa-1521
GENTOO http://security.gentoo.org/glsa/glsa-200804-08.xml
MISC http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
SECUNIA http://secunia.com/advisories/29318
http://secunia.com/advisories/29403
http://secunia.com/advisories/29622
http://secunia.com/advisories/29636
SUSE http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
VUPEN http://www.vupen.com/english/advisories/2008/0885/references
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/41173

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2021-05-04 12:07:16
  • Multiple Updates
2021-04-22 01:07:41
  • Multiple Updates
2020-05-23 01:39:15
  • Multiple Updates
2020-05-23 00:21:25
  • Multiple Updates
2018-10-12 00:20:16
  • Multiple Updates
2017-08-08 09:23:56
  • Multiple Updates
2016-04-26 17:13:01
  • Multiple Updates
2014-02-17 10:44:12
  • Multiple Updates
2013-05-11 00:12:15
  • Multiple Updates