Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
NameCVE-2018-19052First vendor Publication2018-11-07
VendorCveLast vendor Modification2019-02-01

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19052

CWE : Common Weakness Enumeration

%idName
100 %CWE-22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application55
Os7

Nessus® Vulnerability Scanner

DateDescription
2018-12-06Name : The remote web server is affected by multiple vulnerabilities
File : lighttpd_1_4_50.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
MISC https://github.com/lighttpd/lighttpd1.4/commit/2105dae0f9d7a964375ce681e53cb1...

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2019-02-01 17:18:56
  • Multiple Updates
2018-11-07 09:19:46
  • First insertion