Versio.io

CVE-2018-19052

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 07-11-2018 06:29
Last modified: - 31-03-2022 09:48
Total changes: - 3

Description

An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Low
Attack complexity
Network
Attack vector
None
Availability
High
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=lighttpd AND product=lighttpd AND versionEndExcluding=1.4.50
OR
vendor=opensuse AND product=backports_sle AND version=15.0 AND update=-
vendor=opensuse AND product=backports_sle AND version=15.0 AND update=sp1
vendor=opensuse AND product=leap AND version=15.0
vendor=opensuse AND product=leap AND version=15.1
vendor=suse AND product=suse_linux_enterprise_server AND version=11 AND update=sp3
vendor=suse AND product=suse_linux_enterprise_server AND version=11 AND update=sp4
vendor=suse AND product=suse_linux_enterprise_server AND version=12
vendor=suse AND product=suse_linux_enterprise_server AND version=12 AND update=sp1
vendor=suse AND product=suse_linux_enterprise_server AND version=12 AND update=sp2
vendor=suse AND product=suse_linux_enterprise_server AND version=12 AND update=sp3
vendor=suse AND product=suse_linux_enterprise_server AND version=12 AND update=sp4
OR
vendor=Debian AND product=debian_linux AND version=9.0
 

Reference

 


Keywords

NVD

 

CVE-2018-19052

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.