lighttpd < 1.4.20 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 4698

Synopsis

The remote web server may be affected by several issues.

Description

According to its banner, the version of lighttpd installed on the remote host is older than 1.4.20. Such versions may be affected by several issues, including :

- SSL connections could be shut down by a remote attacker.
- URL rewrite and redirect patterns can be circumvented by encoding.
- mod_userdir does not sanitize URLs, which could lead to an information disclosure on case insensitive file systems e.g. http://example.com/~user/file.PHP would get the source code of file.php, instead of running the script.
- The server leaks memory when it processes duplicate headers. This could lead to a denial of service by resource exhaustion.

Solution

Upgrade to version 1.4.20 or higher.

See Also

http://www.lighttpd.net

http://trac.lighttpd.net/trac/ticket/285

http://trac.lighttpd.net/trac/ticket/1720

http://trac.lighttpd.net/trac/ticket/1589

http://trac.lighttpd.net/trac/ticket/1774

http://www.lighttpd.net/2008/9/30/1-4-20-Otherwise-the-terrorists-win

Plugin Details

Severity: Medium

ID: 4698

Family: Web Servers

Published: 10/3/2008

Updated: 3/6/2019

Nessus ID: 34332

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lighttpd:lighttpd

Reference Information

CVE: CVE-2008-1531, CVE-2008-4298, CVE-2008-4359, CVE-2008-4360

BID: 28489, 31434, 31599, 31600