Secunia Advisory: | SA26732 | |
Release Date: | 2007-09-10 | |
Critical: | Highly critical | |
Impact: | System access | |
Where: | From remote | |
Solution Status: | Vendor Patch | |
Software: | lighttpd 1.x | |
CVE reference: | CVE-2007-4727 (Secunia mirror) |
Description:
Mattias Bengtsson and Philip Olausson have reported a vulnerability in lighttpd, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to an error in the mod_fastcgi extension when handling headers in a HTTP request. This can be exploited to e.g. add or replace PHP headers (e.g. SCRIPT_FILENAME) via a HTTP request containing an overly long header.
Successful exploitation allows execution of arbitrary PHP code.
The vulnerability affects versions prior to 1.4.18.
Solution:
Update to version 1.4.18.
Provided and/or discovered by:
Mattias Bengtsson and Philip Olausson, SECWEB
Original Advisory:
SECWEB:
http://secweb.se/en/advisories/lighttpd-fastcgi-remote-vulnerability/
lighttpd:
http://www.lighttpd.net/assets/2007/9/9/lighttpd_sa_2007_12.txt
資料來源 http://secunia.com/advisories/26732/
全站熱搜
留言列表