CVE-2008-1270

lighttpd < 1.4.18 - Unauthenticated Arbitrary File Read via mod_userdir Default Path

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2008-1270. PoCs published by julien.cayzac.

AI-analyzed exploit summary The exploit describes an information disclosure vulnerability in lighttpd 1.4.18 due to improper handling of exceptional conditions, allowing attackers to access sensitive files like /etc/passwd via crafted URLs.

Description

mod_userdir in lighttpd 1.4.18 and earlier, when userdir.path is not set, uses a default of $HOME, which might allow remote attackers to read arbitrary files, as demonstrated by accessing the ~nobody directory.

Exploits (1)

exploitdb WRITEUP VERIFIED
by julien.cayzac · textremotelinux
https://www.exploit-db.com/exploits/31396

The exploit describes an information disclosure vulnerability in lighttpd 1.4.18 due to improper handling of exceptional conditions, allowing attackers to access sensitive files like /etc/passwd via crafted URLs.

Classification
Writeup 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: lighttpd 1.4.18
No auth needed
Prerequisites: Access to the target web server
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (17)

Core 17
Core References
Exploit x_refsource_confirm
https://issues.rpath.com/browse/RPL-2344
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29622
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29318
Third Party Advisory vendor-advisory x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200804-08.xml
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2008/dsa-1521
Various Sources x_refsource_confirm
http://www.lighttpd.net/security/lighttpd_sa_2008_03.txt
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489465/100/0/threaded
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29636
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0885/references
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28226
Various Sources x_refsource_confirm
http://trac.lighttpd.net/trac/ticket/1587
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29403
Various Sources x_refsource_confirm
http://www.lighttpd.net/2008/3/10/1-4-19-made-in-germany
Issue Tracking x_refsource_confirm
https://bugs.gentoo.org/show_bug.cgi?id=212930
Third Party Advisory x_refsource_misc
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0106
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41173

Scores

EPSS 0.0882
EPSS Percentile 92.6%

Details

CWE
CWE-200
Status published
Products (1)
lighttpd/lighttpd < 1.4.18
Published Mar 10, 2008
Tracked Since Feb 18, 2026