Apache <= 2.0.39 Win32 Crafted Traversal Arbitrary File Access

This script is Copyright (C) 2002-2015 Tenable Network Security, Inc.

Synopsis :

It is possible to execute code on the remote host.

Description :

A security vulnerability in Apache 2.0.39 on Windows systems allows
attackers to access files that would otherwise be inaccessible using a
directory traversal attack.

An attacker could use this to read sensitive files or potentially execute any
command on your system.

Solution :

Upgrade to Apache 2.0.40 or later. Alternatively, add the following in
your httpd.conf file, before the first 'Alias' or 'Redirect'
directive :

RedirectMatch 400 \\\.\.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true

Family: Web Servers

Nessus Plugin ID: 11092 (apache_win32_dir_trav.nasl)

Bugtraq ID: 5434

CVE ID: CVE-2002-0661

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now