Nessus Plugin #16472

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

[GLSA-200502-21] lighttpd: Script source disclosure

Family:
Gentoo Local Security Checks
Category:
infos
Copyright:
(C) 2005 Michel Arboi
Summary:
lighttpd: Script source disclosure
Version:
$Revision: 1.1 $
Cve_id:
-
Bugtraq_id:
-
Xrefs:
GLSA:200502-21
Description:
The remote host is affected by the vulnerability described in GLSA-200502-21
(lighttpd: Script source disclosure)


lighttpd uses file extensions to determine which elements are
programs that should be executed and which are static pages that should
be sent as-is. By appending %00 to the filename, you can evade the
extension detection mechanism while still accessing the file.

Impact

A remote attacker could send specific queries and access the
source of scripts that should have been executed as CGI or FastCGI
applications.

Workaround

There is no known workaround at this time.

References:
http://article.gmane.org/gmane.comp.web.lighttpd/1171


Solution:
All lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1"


Risk factor : Low
Generiert am 27.04.2005 um 18:49:54 Uhr.