Information Exposure Affecting lighttpd package, versions <1.4.19-5


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
1.09% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-LIGHTTPD-5686123
  • published3 Oct 2008
  • disclosed3 Oct 2008

Introduced: 3 Oct 2008

CVE-2008-4359  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:13 lighttpd to version 1.4.19-5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lighttpd package and not the lighttpd package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

lighttpd before 1.4.20 compares URIs to patterns in the (1) url.redirect and (2) url.rewrite configuration settings before performing URL decoding, which might allow remote attackers to bypass intended access restrictions, and obtain sensitive information or possibly modify data.

CVSS Scores

version 3.1