Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing ..%5C (dot dot encoded backslash) sequences.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Http_server | Apache | 0.8.11 (including) | 0.8.11 (including) |
Http_server | Apache | 0.8.14 (including) | 0.8.14 (including) |
Http_server | Apache | 1.0 (including) | 1.0 (including) |
Http_server | Apache | 1.0.2 (including) | 1.0.2 (including) |
Http_server | Apache | 1.0.3 (including) | 1.0.3 (including) |
Http_server | Apache | 1.0.5 (including) | 1.0.5 (including) |
Http_server | Apache | 1.1 (including) | 1.1 (including) |
Http_server | Apache | 1.1.1 (including) | 1.1.1 (including) |
Http_server | Apache | 1.2 (including) | 1.2 (including) |
Http_server | Apache | 1.2.5 (including) | 1.2.5 (including) |
Http_server | Apache | 1.3 (including) | 1.3 (including) |