Apache <= 2.0.39 Win32 Crafted Traversal Arbitrary File Access

High Nessus Plugin ID 11092


It is possible to execute code on the remote host.


A security vulnerability in Apache 2.0.39 on Windows systems allows attackers to access files that would otherwise be inaccessible using a directory traversal attack.

An attacker could use this to read sensitive files or potentially execute any command on your system.


Upgrade to Apache 2.0.40 or later. Alternatively, add the following in your httpd.conf file, before the first 'Alias' or 'Redirect' directive :

RedirectMatch 400 \\\.\.

Plugin Details

Severity: High

ID: 11092

File Name: apache_win32_dir_trav.nasl

Version: 1.38

Type: remote

Family: Web Servers

Published: 2002/08/18

Updated: 2018/06/29

Dependencies: 48204

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 7.3

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2002/08/16

Reference Information

CVE: CVE-2002-0661

BID: 5434