Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-1427


The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.


Published

2013-03-21T17:55:03.117

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 1.9 (LOW)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.4

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-310

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application lighttpd lighttpd ≤ 1.4.27 Yes
Application lighttpd lighttpd 1.3.16 Yes
Application lighttpd lighttpd 1.4.3 Yes
Application lighttpd lighttpd 1.4.4 Yes
Application lighttpd lighttpd 1.4.5 Yes
Application lighttpd lighttpd 1.4.6 Yes
Application lighttpd lighttpd 1.4.7 Yes
Application lighttpd lighttpd 1.4.8 Yes
Application lighttpd lighttpd 1.4.9 Yes
Application lighttpd lighttpd 1.4.10 Yes
Application lighttpd lighttpd 1.4.11 Yes
Application lighttpd lighttpd 1.4.12 Yes
Application lighttpd lighttpd 1.4.13 Yes
Application lighttpd lighttpd 1.4.15 Yes
Application lighttpd lighttpd 1.4.16 Yes
Application lighttpd lighttpd 1.4.18 Yes
Application lighttpd lighttpd 1.4.19 Yes
Application lighttpd lighttpd 1.4.20 Yes
Application lighttpd lighttpd 1.4.21 Yes
Application lighttpd lighttpd 1.4.22 Yes
Application lighttpd lighttpd 1.4.23 Yes
Application lighttpd lighttpd 1.4.24 Yes
Application lighttpd lighttpd 1.4.25 Yes
Application lighttpd lighttpd 1.4.26 Yes
Operating System debian debian_linux * No

References