mod_auth in lighttpd before 1.4.36 allows remote attackers to inject arbitrary log entries via a basic HTTP authentication string without a colon character, as demonstrated by a string containing a NULL and new line character.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-dev"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-cml"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-magnet"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-mysql-vhost"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-trigger-b4-dl"
},
{
"binary_version": "1.4.33-1+nmu2ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-webdav"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-dev"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-cml"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-magnet"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-mysql-vhost"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-trigger-b4-dl"
},
{
"binary_version": "1.4.35-4ubuntu2.1+esm1",
"binary_name": "lighttpd-mod-webdav"
}
]
}