HTTP: Apache For Windows Encoded Directory Traversal

This signature detects directory traversal attempts against an Apache server running on a Microsoft Windows platform. Apache 2.0.39 and earlier versions are vulnerable. Attackers can execute arbitrary commands on the target host.

Extended Description

A directory traversal vulnerability exists in Apache versions 2.0.39 and earlier on non-Unix platforms (potentially including Apache compiled with CYGWIN). Platforms that may be affected by this include Windows, OS2, and Netware. The issue is related to the failure to properly process the backslash '\' character, which may be used as a directory delimiter under these platforms. By using the URL encoded sequence '%2e%2e%5c', the web root may be escaped. Exploitation may result in the disclosure of sensitive information. Additionally, arbitrary local programs may be executed with attacker supplied parameters if directory traversal techniques are used to escape the cgi-bin directory.

Affected Products

Apache_software_foundation apache

References

BugTraq: 5434

CVE: CVE-2002-0661

Short Name
HTTP:APACHE:ENCODED-DIRTRAV
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Apache CVE-2002-0661 Directory Encoded For Traversal Windows bid:5434
Release Date
10/16/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apache_software_foundation

CVSS Score

7.5

Found a potential security threat?