Vulnerability Name: CVE-2001-0925 (CCN-6921) Assigned: 2001-03-12 Published: 2001-03-12 Updated: 2021-07-06 Summary: The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): NoneAvailibility (A): None
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): NoneAvailibility (A): None
Vulnerability Type: CWE-22 Vulnerability Consequences: Obtain Information References: Source: CCN Type: SGI Security Advisory 20020301-01-PApache vulnerabilities on IRIX Source: CCN Type: BugTraq Mailing List, Mon Mar 12 2001 - 20:46:41 CSTFORW: [ANNOUNCE] Apache 1.3.19 Released Source: CCN Type: BugTraq Mailing List, Thu Apr 19 2001 - 13:34:26 CDTOpenBSD 2.8patched Apache vuln! Source: CCN Type: BugTraq Mailing List, Jun 24 2001 10:08PMFw: Bugtraq ID 2503 : Apache Artificially Long Slash Path Directory Listing Exploit Source: CCN Type: BugTraq Mailing List, Thu Jul 26 2001 - 10:55:16 CDTApache Artificially Long Slash Path Directory Listing Vulnerabili ty -- FILE READ ACCESS Source: MITRE Type: CNACVE-2001-0925 Source: CCN Type: Apache Web siteIndex of /dist/httpd Source: CCN Type: ApacheWeek Web siteOverview of security vulnerabilities in Apache httpd 1.3 Source: CONFIRM Type: Vendor Advisoryhttp://www.apacheweek.com/features/security-13 Source: CCN Type: ApacheWeek, Issue 264, 28th September 2001Security Reports - Apache 1.3.20 Source: CCN Type: CIAC Information Bulletin M-058Apache Vulnerabilities on IRIX Source: DEBIAN Type: Third Party AdvisoryDSA-067 Source: DEBIAN Type: DSA-067apache -- Remote exploit Source: MANDRAKE Type: Broken LinkMDKSA-2001:077 Source: ENGARDE Type: Third Party AdvisoryESA-20010620-02 Source: CCN Type: EnGarde Secure Linux Security Advisory ESA-20010620-02apache Source: CCN Type: OSVDB ID: 9698Apache HTTP Server mod_negotiation Multiple Slash Request Forced Directory Listing Source: CCN Type: OSVDB ID: 9699Apache HTTP Server mod_dir Multiple Slash Request Forced Directory Listing Source: CCN Type: OSVDB ID: 9700Apache HTTP Server mod_autoindex Multiple Slash Request Forced Directory Listing Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20010312 FORW: [ANNOUNCE] Apache 1.3.19 Released Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20010419 OpenBSD 2.8patched Apache vuln! Source: BUGTRAQ Type: Exploit, Third Party Advisory, VDB Entry20010624 Fw: Bugtraq ID 2503 : Apache Artificially Long Slash Path Directory Listing Exploit Source: BID Type: Exploit, Patch, Third Party Advisory, VDB Entry2503 Source: CCN Type: BID-2503Apache Artificially Long Slash Path Directory Listing Vulnerability Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20010726 Apache Artificially Long Slash Path Directory Listing Vulnerabili ty -- FILE READ ACCESS Source: CCN Type: Trustix Secure Linux Security Advisory #2001-0010Apache Source: XF Type: Third Party Advisory, VDB Entryapache-slash-directory-listing(6921) Source: XF Type: UNKNOWNapache-slash-directory-listing(6921) Source: MLIST Type: Mailing List, Vendor Advisory[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: Mailing List, Vendor Advisory[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ Source: MLIST Type: Mailing List, Vendor Advisory[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html Source: MLIST Type: Mailing List, Vendor Advisory[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ Vulnerable Configuration: Configuration 1 :cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:* Configuration 2 :cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:apache:http_server:1.3.1:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.6:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.12:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.17:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.14:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.11:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.27:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.28:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.29:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.33:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.37:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.0:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.2:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.39:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.3:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.36:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.35:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.34:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.32:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.31:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.4:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.18:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.10:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.13:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.15:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.16:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.30:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.38:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.5:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.7:*:*:*:*:*:*:* OR cpe:/a:apache:http_server:1.3.8:*:*:*:*:*:*:* AND cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:* OR cpe:/o:engardelinux:secure_community:1.0.1:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:* OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.12:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.13:*:*:*:*:*:*:* OR cpe:/o:sgi:irix:6.5.14:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
apache http server 1.3.11
apache http server 1.3.12
apache http server 1.3.14
apache http server 1.3.17
debian debian linux 2.2
apache http server 1.3.1
apache http server 1.3.19
apache http server 1.3.26
apache http server 1.3.6
apache http server 1.3.12
apache http server 1.3.20
apache http server 1.3.23
apache http server 1.3.17
apache http server 1.3.14
apache http server 1.3.11
apache http server 1.3.27
apache http server 1.3.28
apache http server 1.3.29
apache http server 1.3.33
apache http server 1.3.37
apache http server 1.3.0
apache http server 1.3.2
apache http server 1.3.39
apache http server 1.3.3
apache http server 1.3.36
apache http server 1.3.35
apache http server 1.3.34
apache http server 1.3.32
apache http server 1.3.31
apache http server 1.3.24
apache http server 1.3.22
apache http server 1.3.4
apache http server 1.3.18
apache http server 1.3.25
apache http server 1.3.10
apache http server 1.3.13
apache http server 1.3.15
apache http server 1.3.16
apache http server 1.3.30
apache http server 1.3.38
apache http server 1.3.5
apache http server 1.3.7
apache http server 1.3.8
debian debian linux 2.2
mandrakesoft mandrake linux 7.1
trustix secure linux 1.1
mandrakesoft mandrake linux 7.2
mandrakesoft mandrake linux corporate server 1.0.1
engardelinux secure community 1.0.1
trustix secure linux 1.01
trustix secure linux 1.2
mandrakesoft mandrake linux 8.0
sgi irix 6.5.12
sgi irix 6.5.13
sgi irix 6.5.14