Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apache 2.0.39 Win32 directory traversal
Information
Severity
Severity
High
Family
Family
Web Servers
CVSSv2 Base
CVSSv2 Base
7.5
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
18 years ago
Modified
Modified
5 years ago
Summary
Apache 2.0.39 Win32 directory traversal
Insight
Insight
A security vulnerability in Apache 2.0.39 on Windows systems allows attackers to access files that would otherwise be inaccessible using a directory traversal attack.
Affected Software
Affected Software
Apache 2.0 through 2.0.39 on Windows
Detection Method
Detection Method
Sends a crafted GET request and checks the response.
Solution
Solution
Upgrade to Apache 2.0.40 or later. As a workaround add in the httpd.conf, before the first 'Alias' or 'Redirect' directive: RedirectMatch 400 \\\.\.