Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0337

Опубликовано: 27 окт. 2013
Источник: debian
EPSS Низкий

Описание

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nginxunfixedpackage
nginxignoredtrixiepackage
nginxignoredbookwormpackage
nginxignoredbullseyepackage
nginxignoredbusterpackage
nginxignoredstretchpackage
nginxignoredjessiepackage
nginxno-dsawheezypackage
nginxno-dsasqueezepackage

Примечания

  • Can only be fixed properly once https://trac.nginx.org/nginx/ticket/376 is resolved upstream

  • Originally fixed in 1.4.4-2 but reintroduced with DSA-3701-1 (CVE-2016-1247)

  • Post DSA-3701-1, Debian's default configuration is not affected, new log files are

EPSS

Процентиль: 70%
0.00655
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.

nvd
больше 12 лет назад

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.

github
почти 4 года назад

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.

EPSS

Процентиль: 70%
0.00655
Низкий