[+] Lighttpd analysis
This module tests for lighttpd configuration files and binaries
The configuration files are analysed for configuration issues.
The tests of these configuration files is based on the following sources:
- Lighttpd - Docs_SSL
- Alpine Linux - Lighttpd Advanced security
- Hardening guide for lighttpd 1.4.26 on redhat Linux
==> Lighttpd binary analysis
[*] Vulnerability details for lighttpd / version 1.4.53 / source unknown:
lighttpd : 1.4.53 : CVE-2019-11072 : 9.8 : unknown : Exploit (Github: jreisinger_checkip (G))
lighttpd : 1.4.53 : CVE-2022-22707 : 5.9 : unknown : Exploit (Github: jreisinger_checkip (G))
[+] Found 2 CVEs and 2 exploits (including POC's) in lighttpd with version 1.4.53 (source unknown).
[*] Testing lighttpd binaries for binary protection mechanisms:
RELRO STACK CANARY NX PIE RPATH RUNPATH Symbols FORTIFY Fortified Fortifiable FILE
Partial RELRO No canary found NX disabled No PIE No RPATH No RUNPATH No Symbols No 0 10 /logs/firmware/unblob_extracted/firmware_extract/56048-12514271.gzip_extract/gzip.uncompressed_extract/5243916-15068666.gzip_extract/gzip.uncompressed_extract/usr/sbin/lighttpd
[*] Testing lighttpd binaries for deprecated function calls:
[+] /usr/sbin/lighttpd (-rw-r--r-- root root) - common linux file: no - Vulnerable function: fprintf / Function count: 21 / networking: no
[+] /usr/sbin/lighttpd (-rw-r--r-- root root) - common linux file: no - Vulnerable function: mmap / Function count: 1 / Correct error handling: 2
[+] /usr/sbin/lighttpd (-rw-r--r-- root root) - common linux file: no - Vulnerable function: printf / Function count: 1 / networking: no
==> Lighttpd configuration analysis for lighttpd.conf
[*] Testing web server configuration file /logs/firmware/unblob_extracted/firmware_extract/56048-12514271.gzip_extract/gzip.uncompressed_extract/5243916-15068666.gzip_extract/gzip.uncompressed_extract/etc/lighttpd/lighttpd.conf
[*] Testing web server user
[+] Possible configuration issue detected: Web server running as root user:
server.username = "root"
[*] Testing web server root directory location
[*] Testing for additional web server binaries
[*] Testing for directory listing configuration
[*] Testing web server ssl.engine usage
[*] Testing web server pemfile location
[*] Configuration note: Web server using the following pem file
ssl.pemfile = "/NandDisk/ssl/kantechselfsigned/kantechselfsigned.pem"
[*] Testing web server private key file
[*] Testing web server BEAST mitigation
[*] Testing web server for SSL ciphers supported