Short Name |
HTTP:APACHE:ENCODED-DIRTRAV |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Apache For Windows Encoded Directory Traversal |
Release Date |
2003/10/15 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects directory traversal attempts against an Apache server running on a Microsoft Windows platform. Apache 2.0.39 and earlier versions are vulnerable. Attackers can execute arbitrary commands on the target host.
A directory traversal vulnerability exists in Apache versions 2.0.39 and earlier on non-Unix platforms (potentially including Apache compiled with CYGWIN). Platforms that may be affected by this include Windows, OS2, and Netware. The issue is related to the failure to properly process the backslash '\' character, which may be used as a directory delimiter under these platforms. By using the URL encoded sequence '%2e%2e%5c', the web root may be escaped. Exploitation may result in the disclosure of sensitive information. Additionally, arbitrary local programs may be executed with attacker supplied parameters if directory traversal techniques are used to escape the cgi-bin directory.