Vulnerability Description
The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lighttpd | Lighttpd | <= 1.4.27 |
| Debian | Debian Linux | All versions |
Related Weaknesses (CWE)
References
- http://osvdb.org/91462
- http://www.debian.org/security/2013/dsa-2649
- http://www.securityfocus.com/bid/58528
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82897
- http://osvdb.org/91462
- http://www.debian.org/security/2013/dsa-2649
- http://www.securityfocus.com/bid/58528
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82897
FAQ
What is CVE-2013-1427?
CVE-2013-1427 is a vulnerability with a CVSS score of 1.9 (LOW). The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP cont...
How severe is CVE-2013-1427?
CVE-2013-1427 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1427?
Check the references section above for vendor advisories and patch information. Affected products include: Lighttpd Lighttpd, Debian Debian Linux.