Apache on Windows mod_alias URL Validation Canonicalization CGI Source Information Disclosure

medium Nessus Plugin ID 17694

Synopsis

The remote web server is affected by an information disclosure issue.

Description

The version of Apache running on the remote Windows host can be tricked into disclosing the source of its CGI scripts because of a configuration issue. Specifically, if the CGI directory is located within the document root, then requests that alter the case of the directory name will bypass the mod_cgi cgi-script handler and be treated as requests for ordinary files.

Solution

Reconfigure Apache so that the scripts directory is located outside of the document root.

See Also

https://www.securityfocus.com/archive/1/442882/30/0/threaded

Plugin Details

Severity: Medium

ID: 17694

File Name: apache_scriptalias_in_htdocs_dir_traversal2.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 11/18/2011

Updated: 6/22/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2006-4110

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache, Settings/PCI_DSS

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/9/2006

Reference Information

CVE: CVE-2006-4110

BID: 19447