lighttpd < 1.4.28 Insecure Temporary File Creation

high Web App Scanning Plugin ID 112354

Synopsis

lighttpd < 1.4.28 Insecure Temporary File Creation

Description

According to its banner, the version of lighttpd running on the remote host is prior to 1.4.28. Therefore, it may be, affected by the following vulnerability :

- The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to lighttpd version 1.4.28 or later.

See Also

http://seclists.org/fulldisclosure/2013/Mar/153

Plugin Details

Severity: High

ID: 112354

Type: remote

Published: 11/5/2018

Updated: 1/3/2024

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Low

Base Score: 1.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2013-1427

CVSS v3

Risk Factor: High

Base Score: 7

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2013-1427

Vulnerability Information

CPE: cpe:2.3:a:lighttpd:lighttpd:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 3/21/2013

Vulnerability Publication Date: 3/21/2013

Reference Information

CVE: CVE-2013-1427

BID: 58528