Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-4360

Опубликовано: 03 окт. 2008
Источник: ubuntu
Приоритет: low
CVSS2: 7.5

Описание

mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

1.4.19-4ubuntu2
feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

released

1.4.19-0ubuntu3.1
intrepid

not-affected

1.4.19-4ubuntu2
jaunty

not-affected

1.4.19-4ubuntu2
karmic

not-affected

1.4.19-4ubuntu2
upstream

released

1.4.19-5

Показывать по

Ссылки на источники

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.

nvd
почти 17 лет назад

mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.

debian
почти 17 лет назад

mod_userdir in lighttpd before 1.4.20, when a case-insensitive operati ...

github
больше 3 лет назад

mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.

7.5 High

CVSS2