Apache <= 2.0.39 Win32 Crafted Traversal Arbitrary File Access

high Nessus Plugin ID 11092

Synopsis

It is possible to execute code on the remote host.

Description

A security vulnerability in Apache 2.0.39 on Windows systems allows attackers to access files that would otherwise be inaccessible using a directory traversal attack.

An attacker could use this to read sensitive files or potentially execute any command on your system.

Solution

Upgrade to Apache 2.0.40 or later. Alternatively, add the following in your httpd.conf file, before the first 'Alias' or 'Redirect' directive :

RedirectMatch 400 \\\.\.

Plugin Details

Severity: High

ID: 11092

File Name: apache_win32_dir_trav.nasl

Version: 1.38

Type: remote

Family: Web Servers

Published: 8/18/2002

Updated: 6/29/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/16/2002

Reference Information

CVE: CVE-2002-0661

BID: 5434