blob: 16a9a7bc71024ccc305a973534cd4e601ba49dc9 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200502-21">
<title>lighttpd: Script source disclosure</title>
An attacker can trick lighttpd into revealing the source of scripts that
should be executed as CGI or FastCGI applications.
<product type="ebuild">lighttpd</product>
<announced>February 15, 2005</announced>
<revised>May 22, 2006: 02</revised>
<package name="www-servers/lighttpd" auto="yes" arch="*">
<unaffected range="ge">1.3.10-r1</unaffected>
<vulnerable range="lt">1.3.10-r1</vulnerable>
lighttpd is a small-footprint, fast, compliant and very flexible
web-server which is optimized for high-performance environments.
lighttpd uses file extensions to determine which elements are programs
that should be executed and which are static pages that should be sent
as-is. By appending %00 to the filename, you can evade the extension
detection mechanism while still accessing the file.
<impact type="low">
A remote attacker could send specific queries and access the source of
scripts that should have been executed as CGI or FastCGI applications.
There is no known workaround at this time.
All lighttpd users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-servers/lighttpd-1.3.10-r1&quot;</code>
<uri link="">lighttpd-announce Advisory</uri>
<uri link="">CVE-2005-0453</uri>
<metadata tag="requester" timestamp="Mon, 14 Feb 2005 12:34:31 +0000">
<metadata tag="bugReady" timestamp="Mon, 14 Feb 2005 20:13:10 +0000">
<metadata tag="submitter" timestamp="Mon, 14 Feb 2005 20:53:12 +0000">