Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-1270Sensitive Information Exposure in Lighttpd

Severity
5.0MEDIUMNVD
EPSS
8.8%
top 7.46%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 10
Latest updateMay 1

Description

mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/lighttpd< lighttpd 1.4.19-1 (bookworm)
Debianlighttpd/lighttpd< 1.4.19-1+3
NVDlighttpd/lighttpd1.4.18

🔴Vulnerability Details

2
GHSA
GHSA-r872-9mqq-9xpp: mod_userdir in lighttpd 12022-05-01
OSV
CVE-2008-1270: mod_userdir in lighttpd 12008-03-10

💥Exploits & PoCs

1
Exploit-DB
Lighttpd 1.4.x - mod_userdir Information Disclosure2008-03-12

📋Vendor Advisories

6
Red Hat
rkhunter: Insecure auxiliary /tmp file usage (symlink attack possible)2008-08-24
Debian
CVE-2008-1270: lighttpd - mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a...2008
Red Hat
lighttpd considers empty directory string to be CWD
Red Hat
clamav: security fixes in upstream 0.95 (CVE-2008-6680, CVE-2009-1270)
Red Hat
clamav: security fixes in upstream 0.95 (CVE-2008-6680, CVE-2009-1270)

💬Community

2
Bugzilla
clamav: security fixes in upstream 0.95 (CVE-2008-6680, CVE-2009-1270)2009-04-09
Bugzilla
CVE-2008-1270 lighttpd considers empty directory string to be CWD2008-03-11