Vulnerability Name:

CVE-2001-0925 (CCN-6921)

Assigned:2001-03-12
Published:2001-03-12
Updated:2021-07-06
Summary:The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: SGI Security Advisory 20020301-01-P
Apache vulnerabilities on IRIX

Source: CCN
Type: BugTraq Mailing List, Mon Mar 12 2001 - 20:46:41 CST
FORW: [ANNOUNCE] Apache 1.3.19 Released

Source: CCN
Type: BugTraq Mailing List, Thu Apr 19 2001 - 13:34:26 CDT
OpenBSD 2.8patched Apache vuln!

Source: CCN
Type: BugTraq Mailing List, Jun 24 2001 10:08PM
Fw: Bugtraq ID 2503 : Apache Artificially Long Slash Path Directory Listing Exploit

Source: CCN
Type: BugTraq Mailing List, Thu Jul 26 2001 - 10:55:16 CDT
Apache Artificially Long Slash Path Directory Listing Vulnerabili ty -- FILE READ ACCESS

Source: MITRE
Type: CNA
CVE-2001-0925

Source: CCN
Type: Apache Web site
Index of /dist/httpd

Source: CCN
Type: ApacheWeek Web site
Overview of security vulnerabilities in Apache httpd 1.3

Source: CONFIRM
Type: Vendor Advisory
http://www.apacheweek.com/features/security-13

Source: CCN
Type: ApacheWeek, Issue 264, 28th September 2001
Security Reports - Apache 1.3.20

Source: CCN
Type: CIAC Information Bulletin M-058
Apache Vulnerabilities on IRIX

Source: DEBIAN
Type: Third Party Advisory
DSA-067

Source: DEBIAN
Type: DSA-067
apache -- Remote exploit

Source: MANDRAKE
Type: Broken Link
MDKSA-2001:077

Source: ENGARDE
Type: Third Party Advisory
ESA-20010620-02

Source: CCN
Type: EnGarde Secure Linux Security Advisory ESA-20010620-02
apache

Source: CCN
Type: OSVDB ID: 9698
Apache HTTP Server mod_negotiation Multiple Slash Request Forced Directory Listing

Source: CCN
Type: OSVDB ID: 9699
Apache HTTP Server mod_dir Multiple Slash Request Forced Directory Listing

Source: CCN
Type: OSVDB ID: 9700
Apache HTTP Server mod_autoindex Multiple Slash Request Forced Directory Listing

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20010312 FORW: [ANNOUNCE] Apache 1.3.19 Released

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20010419 OpenBSD 2.8patched Apache vuln!

Source: BUGTRAQ
Type: Exploit, Third Party Advisory, VDB Entry
20010624 Fw: Bugtraq ID 2503 : Apache Artificially Long Slash Path Directory Listing Exploit

Source: BID
Type: Exploit, Patch, Third Party Advisory, VDB Entry
2503

Source: CCN
Type: BID-2503
Apache Artificially Long Slash Path Directory Listing Vulnerability

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20010726 Apache Artificially Long Slash Path Directory Listing Vulnerabili ty -- FILE READ ACCESS

Source: CCN
Type: Trustix Secure Linux Security Advisory #2001-0010
Apache

Source: XF
Type: Third Party Advisory, VDB Entry
apache-slash-directory-listing(6921)

Source: XF
Type: UNKNOWN
apache-slash-directory-listing(6921)

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

Source: MLIST
Type: Mailing List, Vendor Advisory
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.27:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.28:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.29:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.16:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.30:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.38:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.8:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:67
    V
    Remote exploit
    2001-07-28
    BACK
    apache http server 1.3.11
    apache http server 1.3.12
    apache http server 1.3.14
    apache http server 1.3.17
    debian debian linux 2.2
    apache http server 1.3.1
    apache http server 1.3.19
    apache http server 1.3.26
    apache http server 1.3.6
    apache http server 1.3.12
    apache http server 1.3.20
    apache http server 1.3.23
    apache http server 1.3.17
    apache http server 1.3.14
    apache http server 1.3.11
    apache http server 1.3.27
    apache http server 1.3.28
    apache http server 1.3.29
    apache http server 1.3.33
    apache http server 1.3.37
    apache http server 1.3.0
    apache http server 1.3.2
    apache http server 1.3.39
    apache http server 1.3.3
    apache http server 1.3.36
    apache http server 1.3.35
    apache http server 1.3.34
    apache http server 1.3.32
    apache http server 1.3.31
    apache http server 1.3.24
    apache http server 1.3.22
    apache http server 1.3.4
    apache http server 1.3.18
    apache http server 1.3.25
    apache http server 1.3.10
    apache http server 1.3.13
    apache http server 1.3.15
    apache http server 1.3.16
    apache http server 1.3.30
    apache http server 1.3.38
    apache http server 1.3.5
    apache http server 1.3.7
    apache http server 1.3.8
    debian debian linux 2.2
    mandrakesoft mandrake linux 7.1
    trustix secure linux 1.1
    mandrakesoft mandrake linux 7.2
    mandrakesoft mandrake linux corporate server 1.0.1
    engardelinux secure community 1.0.1
    trustix secure linux 1.01
    trustix secure linux 1.2
    mandrakesoft mandrake linux 8.0
    sgi irix 6.5.12
    sgi irix 6.5.13
    sgi irix 6.5.14