CVE-2013-1427

Source
https://cve.org/CVERecord?id=CVE-2013-1427
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2013-1427.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2013-1427
Downstream
Published
2013-03-21T17:55:03Z
Modified
2026-04-10T03:42:40.897823Z
Summary
[none]
Details

The configuration file for the FastCGI PHP support for lighttpd before 1.4.28 on Debian GNU/Linux creates a socket file with a predictable name in /tmp, which allows local users to hijack the PHP control socket and perform unauthorized actions such as forcing the use of a different version of PHP via a symlink attack or a race condition.

References

Affected packages