response.c in Lighttpd 1.4.10 and possibly previous versions, when run on Windows, allows remote attackers to read arbitrary source code via requests that contain trailing (1) "." (dot) and (2) space characters, which are ignored by Windows, as demonstrated by PHP files.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18886 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2006-9/advisory/ - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/523 - | |
References | () http://securitytracker.com/id?1015703 - | |
References | () http://trac.lighttpd.net/trac/changeset/1005 - | |
References | () http://www.osvdb.org/23542 - | |
References | () http://www.securityfocus.com/archive/1/426446/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16893 - | |
References | () http://www.vupen.com/english/advisories/2006/0782 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24976 - |
Information
Published : 2006-03-06 21:02
Updated : 2024-11-21 00:07
NVD link : CVE-2006-0814
Mitre link : CVE-2006-0814
CVE.ORG link : CVE-2006-0814
JSON object : View
Products Affected
lighttpd
- lighttpd
CWE