Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0661 | First vendor Publication | 2002-08-12 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0661 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-3 | Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-6 | Argument Injection |
CAPEC-15 | Command Delimiters |
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-43 | Exploiting Multiple Input Interpretation Layers |
CAPEC-63 | Simple Script Injection |
CAPEC-71 | Using Unicode Encoding to Bypass Validation Logic |
CAPEC-73 | User-Controlled Filename |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CAPEC-163 | Spear Phishing |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2005-11-03 | Name : Apache 2.0.39 Win32 directory traversal File : nvt/apache_win32_dir_trav.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
859 | Apache HTTP Server Win32 Crafted Traversal Arbitrary File Access Apache Win32 contains a flaw that allows a remote attacker to access arbitrary files and execute arbitrary binaries outside of the web path. The issue is due to the server not properly sanitizing user input, specifically encoded traversal style attacks (../../) supplied via the URI. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache URI directory traversal attempt RuleID : 21356 - Revision : 4 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2002-08-18 | Name : It is possible to execute code on the remote host. File : apache_win32_dir_trav.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:52 |
|
2024-11-28 12:05:04 |
|
2023-11-07 21:48:11 |
|
2021-06-06 17:23:05 |
|
2021-06-03 13:23:14 |
|
2021-05-04 12:01:50 |
|
2021-04-22 01:01:58 |
|
2021-03-30 17:22:45 |
|
2020-05-23 00:15:00 |
|
2019-08-16 12:01:07 |
|
2016-10-18 12:01:02 |
|
2014-02-17 10:24:46 |
|
2014-01-19 21:21:42 |
|
2013-05-11 12:10:07 |
|