mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "lighttpd",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-dev",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-cml",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-magnet",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-mysql-vhost",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-trigger-b4-dl",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-webdav",
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "lighttpd",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-dev",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-cml",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-magnet",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-mysql-vhost",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-trigger-b4-dl",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
},
{
"binary_name": "lighttpd-mod-webdav",
"binary_version": "1.4.35-4ubuntu2.1+esm1"
}
]
}