CVE-2013-0348
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
13/12/2013
Last modified:
11/04/2025
Description
thttpd.c in sthttpd before 2.26.4-r2 and thttpd 2.25b use world-readable permissions for /var/log/thttpd.log, which allows local users to obtain sensitive information by reading the file.
Impact
Base Score 2.0
2.10
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:open_source_development_team:sthttpd:*:*:*:*:*:*:*:* | 2.26.4 (including) | |
| cpe:2.3:a:open_source_development_team:sthttpd:2.26:*:*:*:*:*:*:* | ||
| cpe:2.3:a:open_source_development_team:sthttpd:2.26.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:open_source_development_team:sthttpd:2.26.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:open_source_development_team:sthttpd:2.26.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:* | ||
| cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:* | ||
| cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:acme:thttpd:2.25:b:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00015.html
- http://opensource.dyc.edu/gitweb/?p=sthttpd.git%3Ba%3Dcommitdiff%3Bh%3Dd2e186dbd58d274a0dea9b59357edc8498b5388d
- http://www.openwall.com/lists/oss-security/2013/02/23/7
- https://bugs.gentoo.org/show_bug.cgi?id=458896
- https://bugzilla.redhat.com/show_bug.cgi?id=924857
- http://lists.opensuse.org/opensuse-updates/2013-12/msg00050.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00015.html
- http://opensource.dyc.edu/gitweb/?p=sthttpd.git%3Ba%3Dcommitdiff%3Bh%3Dd2e186dbd58d274a0dea9b59357edc8498b5388d
- http://www.openwall.com/lists/oss-security/2013/02/23/7
- https://bugs.gentoo.org/show_bug.cgi?id=458896
- https://bugzilla.redhat.com/show_bug.cgi?id=924857



