CVE-2013-0337

The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.0.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:f5:nginx:1.3.12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:47

Type Values Removed Values Added
References () http://secunia.com/advisories/55181 - Vendor Advisory () http://secunia.com/advisories/55181 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201310-04.xml - () http://security.gentoo.org/glsa/glsa-201310-04.xml -
References () http://www.openwall.com/lists/oss-security/2013/02/21/15 - () http://www.openwall.com/lists/oss-security/2013/02/21/15 -
References () http://www.openwall.com/lists/oss-security/2013/02/22/1 - () http://www.openwall.com/lists/oss-security/2013/02/22/1 -
References () http://www.openwall.com/lists/oss-security/2013/02/24/1 - () http://www.openwall.com/lists/oss-security/2013/02/24/1 -

Information

Published : 2013-10-27 00:55

Updated : 2024-11-21 01:47


NVD link : CVE-2013-0337

Mitre link : CVE-2013-0337

CVE.ORG link : CVE-2013-0337


JSON object : View

Products Affected

f5

  • nginx
CWE
CWE-264

Permissions, Privileges, and Access Controls