lighttpd mod_fastcgi HTTP Request Header Remote Overflow

medium Nessus Plugin ID 26057

Synopsis

The remote web server is affected by a buffer overflow vulnerability.

Description

The remote web server appears to be lighttpd running with the FastCGI module (mod_fastcgi). The version of the FastCGI module on the remote host is affected by a buffer overflow vulnerability. A remote attacker can exploit this, by sending a specially crafted request with a long header, to add or replace headers passed to PHP, such as SCRIPT_FILENAME, which in turn could result in arbitrary code execution.

Solution

Upgrade to lighttpd version 1.4.18 or later. Alternatively, disable the FastCGI module.

See Also

http://www.nessus.org/u?b18fbfb0

Plugin Details

Severity: Medium

ID: 26057

File Name: lighttpd_fastcgi_overflow.nasl

Version: 1.20

Type: remote

Family: Web Servers

Published: 9/17/2007

Updated: 7/13/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lighttpd:lighttpd

Required KB Items: installed_sw/lighttpd, www/php

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/10/2007

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2007-4727

BID: 25622

CWE: 119