Nessus Plugin #11092
Plugin Index
Note: This file has been created from a
downloaded version of the Nessus Plugins
from
http://www.nessus.org/.
Therefore, the information here can be outdated.
Apache 2.0.39 Win32 directory traversal
- Family:
- CGI abuses
- Category:
- infos
- Copyright:
- This script is Copyright (C) 2002 Michel Arboi
- Summary:
- Apache 2.0.39 Win32 directory traversal
- Version:
- $Revision: 1.15 $
- Cve_id:
- CAN-2002-0661
- Bugtraq_id:
- 5434
- Xrefs:
- -
- Description:
A security vulnerability in Apache 2.0.39 on Windows systems
allows attackers to access files that would otherwise be
inaccessible using a directory traversal attack.
A cracker may use this to read sensitive files or even execute
any command on your system.
Solutions:
- Upgrade to Apache 2.0.40
- or install it on a Unix machine
- or add in your httpd.conf, before the first
'Alias' or 'Redirect' directive:
RedirectMatch 400 \\\.\.
Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.