Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-0337 (GCVE-0-2013-0337)
Vulnerability from cvelistv5 – Published: 2013-10-27 00:00 – Updated: 2024-08-06 14:25
VLAI?
EPSS
Summary
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T14:25:09.144Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "55181",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/55181"
},
{
"name": "[oss-security] 20130224 nginx CVE-2013-0337 world-readable logs",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
},
{
"name": "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name": "GLSA-201310-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"name": "[oss-security] 20130221 nginx world-readable logdir",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-10-27T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "55181",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/55181"
},
{
"name": "[oss-security] 20130224 nginx CVE-2013-0337 world-readable logs",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
},
{
"name": "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name": "GLSA-201310-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"name": "[oss-security] 20130221 nginx world-readable logdir",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-0337",
"datePublished": "2013-10-27T00:00:00.000Z",
"dateReserved": "2012-12-06T00:00:00.000Z",
"dateUpdated": "2024-08-06T14:25:09.144Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTFR-2020-AVI-290
Vulnerability from certfr_avis - Published: 2020-05-14 - Updated: 2020-05-18
De multiples vulnérabilités ont été découvertes dans Palo Alto PAN-OS et GlobalProtect. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | GlobalProtect versions 5.1.x antérieures à 5.1.2 sur Windows et MacOS | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 8.x antérieures à 8.1.14 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.1.x antérieures à 9.1.2 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 7.1.x antérieures à 7.1.26 | ||
| Palo Alto Networks | PAN-OS | PAN-OS versions 9.0.x antérieures à 9.0.8 | ||
| Palo Alto Networks | PAN-OS | GlobalProtect versions 5.0.x antérieures à 5.0.9 sur Windows et MacOS |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GlobalProtect versions 5.1.x ant\u00e9rieures \u00e0 5.1.2 sur Windows et MacOS",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 8.x ant\u00e9rieures \u00e0 8.1.14",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 7.1.x ant\u00e9rieures \u00e0 7.1.26",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.8",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
},
{
"description": "GlobalProtect versions 5.0.x ant\u00e9rieures \u00e0 5.0.9 sur Windows et MacOS",
"product": {
"name": "PAN-OS",
"vendor": {
"name": "Palo Alto Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2002"
},
{
"name": "CVE-2020-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2006"
},
{
"name": "CVE-2020-2015",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2015"
},
{
"name": "CVE-2020-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2001"
},
{
"name": "CVE-2020-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1994"
},
{
"name": "CVE-2020-1996",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1996"
},
{
"name": "CVE-2013-0337",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0337"
},
{
"name": "CVE-2020-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2007"
},
{
"name": "CVE-2020-2009",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2009"
},
{
"name": "CVE-2020-2012",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2012"
},
{
"name": "CVE-2020-2013",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2013"
},
{
"name": "CVE-2016-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4450"
},
{
"name": "CVE-2020-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2014"
},
{
"name": "CVE-2020-2017",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2017"
},
{
"name": "CVE-2020-2008",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2008"
},
{
"name": "CVE-2020-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2010"
},
{
"name": "CVE-2020-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1997"
},
{
"name": "CVE-2020-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1993"
},
{
"name": "CVE-2020-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2005"
},
{
"name": "CVE-2020-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1998"
},
{
"name": "CVE-2017-7529",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7529"
},
{
"name": "CVE-2020-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2003"
},
{
"name": "CVE-2020-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1995"
},
{
"name": "CVE-2020-2018",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2018"
},
{
"name": "CVE-2020-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2004"
}
],
"initial_release_date": "2020-05-14T00:00:00",
"last_revision_date": "2020-05-18T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-290",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-05-14T00:00:00.000000"
},
{
"description": "Retrait des liens Mitre en double.",
"revision_date": "2020-05-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Palo Alto PAN-OS et\nGlobalProtect. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Palo Alto PAN-OS et GlobalProtect",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1998 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1998"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2010 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2010"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1994 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1994"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2002 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2002"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2014 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2014"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1997 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1997"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2012 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2012"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2009 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2009"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1996 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1996"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2013 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2013"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2017 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2017"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2017-7529 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2017-7529"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2008 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2008"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2004 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2004"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2007 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2007"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1993 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1993"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2015 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2015"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2003 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2003"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2005 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2005"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2006 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2006"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2018 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2018"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-1995 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-1995"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Palo Alto CVE-2020-2001 du 13 mai 2020",
"url": "https://security.paloaltonetworks.com/CVE-2020-2001"
}
]
}
GSD-2013-0337
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-0337",
"description": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.",
"id": "GSD-2013-0337",
"references": [
"https://www.suse.com/security/cve/CVE-2013-0337.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-0337"
],
"details": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.",
"id": "GSD-2013-0337",
"modified": "2023-12-13T01:22:14.417785Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0337",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://secunia.com/advisories/55181",
"refsource": "MISC",
"url": "http://secunia.com/advisories/55181"
},
{
"name": "http://security.gentoo.org/glsa/glsa-201310-04.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/02/21/15",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/02/22/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name": "http://www.openwall.com/lists/oss-security/2013/02/24/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:f5:nginx:1.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0337"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20130221 nginx world-readable logdir",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
},
{
"name": "[oss-security] 20130221 Re: CVE request: nginx world-readable logdir",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"name": "55181",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55181"
},
{
"name": "[oss-security] 20130224 nginx CVE-2013-0337 world-readable logs",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
},
{
"name": "GLSA-201310-04",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2021-11-10T15:57Z",
"publishedDate": "2013-10-27T00:55Z"
}
}
}
FKIE_CVE-2013-0337
Vulnerability from fkie_nvd - Published: 2013-10-27 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://secunia.com/advisories/55181 | Vendor Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201310-04.xml | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/02/21/15 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/02/22/1 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/02/24/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/55181 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201310-04.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/02/21/15 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/02/22/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/02/24/1 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| f5 | nginx | * | |
| f5 | nginx | 1.0.0 | |
| f5 | nginx | 1.0.1 | |
| f5 | nginx | 1.0.2 | |
| f5 | nginx | 1.0.3 | |
| f5 | nginx | 1.0.4 | |
| f5 | nginx | 1.0.5 | |
| f5 | nginx | 1.0.6 | |
| f5 | nginx | 1.0.7 | |
| f5 | nginx | 1.0.8 | |
| f5 | nginx | 1.0.9 | |
| f5 | nginx | 1.0.10 | |
| f5 | nginx | 1.0.11 | |
| f5 | nginx | 1.0.12 | |
| f5 | nginx | 1.0.13 | |
| f5 | nginx | 1.0.14 | |
| f5 | nginx | 1.0.15 | |
| f5 | nginx | 1.1.0 | |
| f5 | nginx | 1.1.1 | |
| f5 | nginx | 1.1.2 | |
| f5 | nginx | 1.1.3 | |
| f5 | nginx | 1.1.4 | |
| f5 | nginx | 1.1.5 | |
| f5 | nginx | 1.1.6 | |
| f5 | nginx | 1.1.7 | |
| f5 | nginx | 1.1.8 | |
| f5 | nginx | 1.1.9 | |
| f5 | nginx | 1.1.10 | |
| f5 | nginx | 1.1.11 | |
| f5 | nginx | 1.1.12 | |
| f5 | nginx | 1.1.13 | |
| f5 | nginx | 1.1.14 | |
| f5 | nginx | 1.1.15 | |
| f5 | nginx | 1.1.16 | |
| f5 | nginx | 1.1.17 | |
| f5 | nginx | 1.1.18 | |
| f5 | nginx | 1.1.19 | |
| f5 | nginx | 1.2.0 | |
| f5 | nginx | 1.3.0 | |
| f5 | nginx | 1.3.1 | |
| f5 | nginx | 1.3.2 | |
| f5 | nginx | 1.3.3 | |
| f5 | nginx | 1.3.4 | |
| f5 | nginx | 1.3.5 | |
| f5 | nginx | 1.3.6 | |
| f5 | nginx | 1.3.7 | |
| f5 | nginx | 1.3.8 | |
| f5 | nginx | 1.3.9 | |
| f5 | nginx | 1.3.10 | |
| f5 | nginx | 1.3.11 | |
| f5 | nginx | 1.3.12 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B697C7BD-EBB3-4E09-B3A2-51F633CBA33F",
"versionEndIncluding": "1.3.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A92C59FE-2F13-4F11-A47E-735014B40B96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA846C3B-DE83-45BC-8ADF-D9D165A1B35E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BF523E1B-C927-477A-AEA4-0FD09FB6D00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F1FF1D9-6A92-40EA-AA97-F1E2FCFFE337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DA8F9095-899B-4A78-8C43-5F8A78739A8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "852B6280-0C65-4109-A5C9-AB4829706BE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "37FED4E4-C729-4A09-ACE6-5A894E25BEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B47E5C82-6BD7-464F-A43A-EE0239A9AA94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "415118D8-A0F4-447F-8EB8-70118FAA53D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E14AED43-AA7D-4D28-A78C-93DFE8FCBE28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4A39D319-067C-4362-89A4-EF19C4800FAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4735424A-623E-4131-991A-B8B5EC0C86DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "6E42DAE6-81B1-4754-A612-0CB237645362",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7D6385-F555-4E9A-95D0-4B8EA6EE9007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DC6B9604-B425-4E13-B421-D4ACDA6B7061",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AD6CD2-FF99-4D04-9BF3-ED1172393558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "148503FA-5075-4DF5-A7FE-999705A7CE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "735FF1FA-5057-4B1F-A294-2A752BCA194D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48E913BE-BED6-45BC-93B0-8E8ED8CADA90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C1687047-9637-40AA-BDBA-307A0CF759A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "28D54D37-B4C6-4C02-990A-FE4B3AF14C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A25C01B-694D-49AE-BBA6-2DF97DADC476",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B89ADD3F-96F0-4446-84BB-9AC89C87BC6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "962080EE-E28E-42B5-8EC3-04027B2C1EED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C1B905B5-3CD1-49E2-BF39-10AD5D1A08DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "1B6CD0AD-C015-4AE1-9DA4-34807B39A566",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CD288DA7-09D4-4EF3-A9FF-BF64A173E4CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0A19A247-6ED3-4285-BFE5-D9B1A1EE65ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5F9DE85D-F318-458A-AE15-B3817D59A639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "DF113932-7630-43CD-8E2F-F528F2ADE13D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "85833DE5-0976-4878-956A-C62FA8D62320",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6A24CE54-FC14-4E60-B544-D3A560A997A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DB906A07-7365-4859-9702-89B689FE7511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "5A4FF89D-7336-43A1-9BA7-08DDC4870603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "7764DE0F-5D55-4428-BADE-EF778317D25D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "C409371F-4106-4A7D-ACA9-8B6078EFE159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F89D9745-140B-4E30-A356-4E45E8BC7B4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "645A3263-E14F-4A55-A6C7-C1DC8A6E1D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3501FE83-3C34-40F9-906D-903657CAF4D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "559EE0DF-1B70-46F3-83D5-4DB5E8B2C7FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "04363963-0870-4048-BD20-A875C5E766D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ECAFDD11-741A-4D0F-B1A4-1B559E1FF183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1C3A08BC-FEA5-4AF4-8E7B-64897161587B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AC924947-81BE-4A20-9BF4-E8EB821AD2FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "02436F5B-2E4C-436B-80D7-5043C498198D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F0980065-E8E3-4985-88A3-A1CC034F4EB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADEBD57-B8A6-4041-951F-E125F753D656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A7FDC9FE-4BE8-4D11-B89F-FF261DBDC5F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF31307-C052-443B-8BAC-A07E536684E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:nginx:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "48278C21-ED8B-4AB3-A43F-E1AABA9BEB5B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."
},
{
"lang": "es",
"value": "La configuraci\u00f3n predeterminada de nginx, posiblemente versi\u00f3n 1.3.13 y anteriores, utiliza permisos de lectura global para los archivos (1) access.log y (2) error.log, que permite a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de los archivos."
}
],
"evaluatorComment": "AV:N per http://www.gentoo.org/security/en/glsa/glsa-201310-04.xml\n\nand per http://secunia.com/advisories/55181",
"id": "CVE-2013-0337",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-27T00:55:03.713",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55181"
},
{
"source": "secalert@redhat.com",
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/55181"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-9PH7-V5FX-QWXF
Vulnerability from github – Published: 2022-05-05 02:48 – Updated: 2022-05-05 02:48
VLAI?
Details
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
{
"affected": [],
"aliases": [
"CVE-2013-0337"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2013-10-27T00:55:00Z",
"severity": "HIGH"
},
"details": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.",
"id": "GHSA-9ph7-v5fx-qwxf",
"modified": "2022-05-05T02:48:49Z",
"published": "2022-05-05T02:48:49Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0337"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/55181"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
}
],
"schema_version": "1.4.0",
"severity": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…