Vulnerability Description
LightTPD 1.4.8 and earlier, when the web root is on a case-insensitive filesystem, allows remote attackers to bypass URL checks and obtain sensitive information via file extensions with unexpected capitalization, as demonstrated by a request for index.PHP when the configuration invokes the PHP interpreter only for ".php" names.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lighttpd | Lighttpd | 1.0.2 |
References
- http://lighttpd.net/news/
- http://secunia.com/advisories/18869PatchVendor Advisory
- http://www.lighttpd.net/news/
- http://www.osvdb.org/23229
- http://www.vupen.com/english/advisories/2006/0550
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24699
- http://lighttpd.net/news/
- http://secunia.com/advisories/18869PatchVendor Advisory
- http://www.lighttpd.net/news/
- http://www.osvdb.org/23229
- http://www.vupen.com/english/advisories/2006/0550
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24699
FAQ
What is CVE-2006-0760?
CVE-2006-0760 is a vulnerability with a CVSS score of 2.6 (LOW). LightTPD 1.4.8 and earlier, when the web root is on a case-insensitive filesystem, allows remote attackers to bypass URL checks and obtain sensitive information via file extensions with unexpected cap...
How severe is CVE-2006-0760?
CVE-2006-0760 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-0760?
Check the references section above for vendor advisories and patch information. Affected products include: Lighttpd Lighttpd.