Nessus Plugin #16472
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
[GLSA-200502-21] lighttpd: Script source disclosure
- Family:
- Gentoo Local Security Checks
- Category:
- infos
- Copyright:
- (C) 2005 Michel Arboi
- Summary:
- lighttpd: Script source disclosure
- Version:
- $Revision: 1.1 $
- Cve_id:
- -
- Bugtraq_id:
- -
- Xrefs:
- GLSA:200502-21
- Description:
- The remote host is affected by the vulnerability described in GLSA-200502-21
(lighttpd: Script source disclosure)
lighttpd uses file extensions to determine which elements are
programs that should be executed and which are static pages that should
be sent as-is. By appending %00 to the filename, you can evade the
extension detection mechanism while still accessing the file.
Impact
A remote attacker could send specific queries and access the
source of scripts that should have been executed as CGI or FastCGI
applications.
Workaround
There is no known workaround at this time.
References:
http://article.gmane.org/gmane.comp.web.lighttpd/1171
Solution:
All lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1"
Risk factor : Low
Generiert am 27.04.2005 um 18:49:54 Uhr.