Apache <= 2.0.39 Win32 Crafted Traversal Arbitrary File Access

This script is Copyright (C) 2002-2012 Tenable Network Security, Inc.


Synopsis :

It is possible to execute code on the remote host.

Description :

A security vulnerability in Apache 2.0.39 on Windows systems allows
attackers to access files that would otherwise be inaccessible using a
directory traversal attack.

An attacker could use this to read sensitive files or potentially execute any
command on your system.

Solution :

Upgrade to Apache 2.0.40 or add in your httpd.conf, before the first
'Alias' or 'Redirect' directive :

RedirectMatch 400 \\\.\.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11092 (apache_win32_dir_trav.nasl)

Bugtraq ID: 5434

CVE ID: CVE-2002-0661