fkie_cve-2013-0337
Vulnerability from fkie_nvd
Published
2013-10-27 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Impacted products
Vendor Product Version
f5 nginx *
f5 nginx 1.0.0
f5 nginx 1.0.1
f5 nginx 1.0.2
f5 nginx 1.0.3
f5 nginx 1.0.4
f5 nginx 1.0.5
f5 nginx 1.0.6
f5 nginx 1.0.7
f5 nginx 1.0.8
f5 nginx 1.0.9
f5 nginx 1.0.10
f5 nginx 1.0.11
f5 nginx 1.0.12
f5 nginx 1.0.13
f5 nginx 1.0.14
f5 nginx 1.0.15
f5 nginx 1.1.0
f5 nginx 1.1.1
f5 nginx 1.1.2
f5 nginx 1.1.3
f5 nginx 1.1.4
f5 nginx 1.1.5
f5 nginx 1.1.6
f5 nginx 1.1.7
f5 nginx 1.1.8
f5 nginx 1.1.9
f5 nginx 1.1.10
f5 nginx 1.1.11
f5 nginx 1.1.12
f5 nginx 1.1.13
f5 nginx 1.1.14
f5 nginx 1.1.15
f5 nginx 1.1.16
f5 nginx 1.1.17
f5 nginx 1.1.18
f5 nginx 1.1.19
f5 nginx 1.2.0
f5 nginx 1.3.0
f5 nginx 1.3.1
f5 nginx 1.3.2
f5 nginx 1.3.3
f5 nginx 1.3.4
f5 nginx 1.3.5
f5 nginx 1.3.6
f5 nginx 1.3.7
f5 nginx 1.3.8
f5 nginx 1.3.9
f5 nginx 1.3.10
f5 nginx 1.3.11
f5 nginx 1.3.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B697C7BD-EBB3-4E09-B3A2-51F633CBA33F",
              "versionEndIncluding": "1.3.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A92C59FE-2F13-4F11-A47E-735014B40B96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA846C3B-DE83-45BC-8ADF-D9D165A1B35E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF523E1B-C927-477A-AEA4-0FD09FB6D00F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F1FF1D9-6A92-40EA-AA97-F1E2FCFFE337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA8F9095-899B-4A78-8C43-5F8A78739A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "852B6280-0C65-4109-A5C9-AB4829706BE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "37FED4E4-C729-4A09-ACE6-5A894E25BEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47E5C82-6BD7-464F-A43A-EE0239A9AA94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "415118D8-A0F4-447F-8EB8-70118FAA53D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14AED43-AA7D-4D28-A78C-93DFE8FCBE28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A39D319-067C-4362-89A4-EF19C4800FAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4735424A-623E-4131-991A-B8B5EC0C86DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E42DAE6-81B1-4754-A612-0CB237645362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7D6385-F555-4E9A-95D0-4B8EA6EE9007",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC6B9604-B425-4E13-B421-D4ACDA6B7061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AD6CD2-FF99-4D04-9BF3-ED1172393558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "148503FA-5075-4DF5-A7FE-999705A7CE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "735FF1FA-5057-4B1F-A294-2A752BCA194D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "48E913BE-BED6-45BC-93B0-8E8ED8CADA90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1687047-9637-40AA-BDBA-307A0CF759A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "28D54D37-B4C6-4C02-990A-FE4B3AF14C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A25C01B-694D-49AE-BBA6-2DF97DADC476",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B89ADD3F-96F0-4446-84BB-9AC89C87BC6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "962080EE-E28E-42B5-8EC3-04027B2C1EED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1B905B5-3CD1-49E2-BF39-10AD5D1A08DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B6CD0AD-C015-4AE1-9DA4-34807B39A566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD288DA7-09D4-4EF3-A9FF-BF64A173E4CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A19A247-6ED3-4285-BFE5-D9B1A1EE65ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F9DE85D-F318-458A-AE15-B3817D59A639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF113932-7630-43CD-8E2F-F528F2ADE13D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "85833DE5-0976-4878-956A-C62FA8D62320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A24CE54-FC14-4E60-B544-D3A560A997A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB906A07-7365-4859-9702-89B689FE7511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4FF89D-7336-43A1-9BA7-08DDC4870603",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7764DE0F-5D55-4428-BADE-EF778317D25D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C409371F-4106-4A7D-ACA9-8B6078EFE159",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F89D9745-140B-4E30-A356-4E45E8BC7B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "645A3263-E14F-4A55-A6C7-C1DC8A6E1D26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3501FE83-3C34-40F9-906D-903657CAF4D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "559EE0DF-1B70-46F3-83D5-4DB5E8B2C7FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "04363963-0870-4048-BD20-A875C5E766D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECAFDD11-741A-4D0F-B1A4-1B559E1FF183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C3A08BC-FEA5-4AF4-8E7B-64897161587B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC924947-81BE-4A20-9BF4-E8EB821AD2FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "02436F5B-2E4C-436B-80D7-5043C498198D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0980065-E8E3-4985-88A3-A1CC034F4EB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADEBD57-B8A6-4041-951F-E125F753D656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7FDC9FE-4BE8-4D11-B89F-FF261DBDC5F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAF31307-C052-443B-8BAC-A07E536684E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:f5:nginx:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "48278C21-ED8B-4AB3-A43F-E1AABA9BEB5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n predeterminada de nginx, posiblemente versi\u00f3n 1.3.13 y anteriores, utiliza permisos de lectura global para los archivos (1) access.log y (2) error.log, que permite a usuarios locales obtener informaci\u00f3n sensible mediante la lectura de los archivos."
    }
  ],
  "evaluatorComment": "AV:N per http://www.gentoo.org/security/en/glsa/glsa-201310-04.xml\n\nand per http://secunia.com/advisories/55181",
  "id": "CVE-2013-0337",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-27T00:55:03.713",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55181"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201310-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/21/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/22/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/02/24/1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…