Vulnerability Name:
CVE-2002-1592 (CCN-9623)
Assigned:
2002-05-06
Published:
2002-05-06
Updated:
2021-06-06
Summary:
The ap_log_rerror function in Apache 2.0 through 2.035, when a CGI application encounters an error, sends error messages to the client that include the full path for the server, which allows remote attackers to obtain sensitive information.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
None
Availibility (A):
None
CVSS v2 Severity:
5.0 Medium
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
None
Availibility (A):
None
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Obtain Information
References:
Source: MITRE
Type: CNA
CVE-2002-1592
Source: CCN
Type: Apache Web site
CHANGES_2.0
Source: CONFIRM
Type: UNKNOWN
http://www.apache.org/dist/httpd/CHANGES_2.0
Source: XF
Type: UNKNOWN
apache-aplogrerror-path-disclosure(9623)
Source: CCN
Type: US-CERT VU#165803
Apache Web Server ap_log_rerror() function discloses full path to CGI script
Source: CERT-VN
Type: US Government Resource
VU#165803
Source: CCN
Type: OSVDB ID: 14879
Apache HTTP Server ap_log_rerror Function Error Message Path Disclosure
Source: BID
Type: UNKNOWN
5256
Source: CCN
Type: BID-5256
Apache httpd 2.0 CGI Error Path Disclosure Vulnerability
Source: XF
Type: UNKNOWN
apache-aplogrerror-path-disclosure(9623)
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210606 svn commit: r1075470 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1888194 [2/13] - /httpd/site/trunk/content/security/json/
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073139 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
Vulnerable Configuration:
Configuration 1
:
cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:apache:http_server:2.0:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0.28:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0.32:*:*:*:*:*:*:*
OR
cpe:/a:apache:http_server:2.0.35:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apache
http server 2.0.32
apache
http server 2.0
apache
http server 2.0.28
apache
http server 2.0.35
apache
http server 2.0
apache
http server 2.0.28
apache
http server 2.0.32
apache
http server 2.0.35