Nessus Plugin #11092

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

Apache 2.0.39 Win32 directory traversal

Family:
CGI abuses
Category:
infos
Copyright:
This script is Copyright (C) 2002 Michel Arboi
Summary:
Apache 2.0.39 Win32 directory traversal
Version:
$Revision: 1.15 $
Cve_id:
CAN-2002-0661
Bugtraq_id:
5434
Xrefs:
-
Description:

A security vulnerability in Apache 2.0.39 on Windows systems
allows attackers to access files that would otherwise be
inaccessible using a directory traversal attack.
A cracker may use this to read sensitive files or even execute
any command on your system.

Solutions:
- Upgrade to Apache 2.0.40
- or install it on a Unix machine
- or add in your httpd.conf, before the first
'Alias' or 'Redirect' directive:
RedirectMatch 400 \\\.\.

Risk factor : High
Generiert am 27.04.2005 um 18:49:54 Uhr.