Vulnerability Description
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| F5 | Nginx | <= 1.3.13 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/55181Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201310-04.xml
- http://www.openwall.com/lists/oss-security/2013/02/21/15
- http://www.openwall.com/lists/oss-security/2013/02/22/1
- http://www.openwall.com/lists/oss-security/2013/02/24/1
- http://secunia.com/advisories/55181Vendor Advisory
- http://security.gentoo.org/glsa/glsa-201310-04.xml
- http://www.openwall.com/lists/oss-security/2013/02/21/15
- http://www.openwall.com/lists/oss-security/2013/02/22/1
- http://www.openwall.com/lists/oss-security/2013/02/24/1
FAQ
What is CVE-2013-0337?
CVE-2013-0337 is a vulnerability with a CVSS score of 7.5 (HIGH). The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive informatio...
How severe is CVE-2013-0337?
CVE-2013-0337 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0337?
Check the references section above for vendor advisories and patch information. Affected products include: F5 Nginx.