#VU32559 SQL injection in lighttpd - CVE-2014-2323
Published: March 14, 2014 / Updated: July 29, 2020
lighttpd
lighttpd
Description
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the host name, related to request_check_hostname. A remote attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
External links
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2014_01.txt
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00006.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://seclists.org/oss-sec/2014/q1/561
- http://seclists.org/oss-sec/2014/q1/564
- http://secunia.com/advisories/57404
- http://secunia.com/advisories/57514
- http://www.debian.org/security/2014/dsa-2877
- http://www.lighttpd.net/2014/3/12/1.4.35/