Directory Traversal Bug in Non-Unix Apache
PivX has released details on the critical Apache security hole for which they gave a vague early warning last week. The web server is vulnerable to a directory traversal attack which can be used to execute arbitrary commands on a system using the cgi-bin. In addition, any file on the system could be read. PivX has also found a path disclosure bug which can reveal the physical location of a file on the server. Both of these issues only affect *non-Unix* versions of the software on OS’s that support backslash path delimiters, such as Windows, Netware, and OS2.
Apache’s advisory includes a simple workaround, and version 2.0.40 has been patched. Also see the Bugtraq post for more information.
(N-Stalker Security Force)
This entry was posted in Previous Security Advisories. Bookmark the permalink.