STG Security Advisory: [SSA-20040217-06] Apache for cygwin directory traversal vulnerability

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




STG Security Advisory: [SSA-20040217-06] Apache for cygwin directory
traversal vulnerability

Revision 1.0
Date Published: 2004-02-17 (KST)
Last Update: 2004-02-17
Disclosed by SSR Team (advisory@stgsecurity.com)


Abstract
========
Apache on cygwin environment has a directory traversal vulnerability.

Vulnerability Class
===================
Implementation Error: Input validation flaw

Details
=======
Apache httpd on cygwin environment has a directory traversal vulnerability
similar to a reported bug in
http://cert.uni-stuttgart.de/archive/bugtraq/2002/08/msg00241.html

Using the following code, a malicious user can retrieve any file.
http://[server]/..%5C..%5C..%5C..%5C..%5C..%5C/boot.ini

Impact
======
File disclosure

Solution
=========
Stipe Tolj, Apache for cygwin maintainer, released a patch file to fix this
vulnerability on Apache 1.3.29 as shown in the following URL.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=26152

Apache 2 on the cygwin, however, is still vulnerable and is recommended not
to use it for a production server.

Affected Products
================
Apache 1.3.29 and below
Apache 2.0.48 and below

Vendor Status: FIXED
=======================
2004-01-13 Jeremy Bae found the vulnerabilities.
2004-01-15 Apache project notified.
2004-02-03 Cygwin platform maintainer confirmed.
2004-02-04 A patch file released.
2004-02-17 Official release.

Credits
======
Jeremy Bae at STG Security

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux