Joined: 17 Apr 2002
Location: Raleigh, NC
|Posted: Tue Feb 15, 2005 9:50 pm Post subject: [ GLSA 200502-21 ] lighttpd: Script source disclosure
|Gentoo Linux Security Advisory
Title: lighttpd: Script source disclosure (GLSA 200502-21)
Date: February 15, 2005
Updated: May 22, 2006
An attacker can trick lighttpd into revealing the source of scripts that should be executed as CGI or FastCGI applications.
lighttpd is a small-footprint, fast, compliant and very flexible web-server which is optimized for high-performance environments.
Vulnerable: < 1.3.10-r1
Unaffected: >= 1.3.10-r1
Architectures: All supported architectures
lighttpd uses file extensions to determine which elements are programs that should be executed and which are static pages that should be sent as-is. By appending %00 to the filename, you can evade the extension detection mechanism while still accessing the file.
A remote attacker could send specific queries and access the source of scripts that should have been executed as CGI or FastCGI applications.
There is no known workaround at this time.
All lighttpd users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1"
Last edited by GLSA on Sun Jul 30, 2006 4:17 am; edited 4 times in total