Apache for Cygwin "dot dot" directory traversal

apache-cygwin-directory-traversal (15293) The risk level is classified as MediumMedium Risk

Description:

Apache HTTP Server when running on Cygwin, could allow a remote attacker to traverse directories on the Web server. A remote attacker could send a specially-crafted HTTP request containing hexadecimal URL encoded "dot dot" sequences (..%5c) to traverse directories and view any file on the Web server.


Consequences:

Obtain Information

Remedy:

For Apache HTTP Server 1.3.29 and earlier:
Apply the 02/04/04 16:42 patch, available from the Bugzilla Bug 26152 Web page. See References.

No remedy available as of February 2004 for Apache HTTP Server 2.0.48 and earlier.

References:

  • Bugzilla Bug 26152 Web page: Apache 1.3.29 and below directory traversal vulnerability .
  • Full-Disclosure Mailing List, Mon Feb 23 2004 - 19:17:33 CST: Apache for cygwin directory traversal vulnerability .
  • BID-9733: Apache Cygwin Directory Traversal Vulnerability
  • CVE-2004-0173: Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing ..%5C (dot dot encoded backslash) sequences.
  • OSVDB ID: 4037: Apache HTTP Server on Cygwin Encoded GET Request Arbitrary File Access
  • SA10962: Apache Directory Traversal Vulnerability

Platforms Affected:

  • Apache HTTP Server 0.8.11
  • Apache HTTP Server 0.8.14
  • Apache HTTP Server 1.0
  • Apache HTTP Server 1.0.2
  • Apache HTTP Server 1.0.3
  • Apache HTTP Server 1.0.5
  • Apache HTTP Server 1.1
  • Apache HTTP Server 1.1.1
  • Apache HTTP Server 1.2
  • Apache HTTP Server 1.2.5
  • Apache HTTP Server 1.3
  • Cygwin Cygwin

Reported:

Feb 24, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page