First published: Thu Apr 15 2004(Updated: )
Directory traversal vulnerability in Apache 1.3.29 and earlier, and Apache 2.0.48 and earlier, when running on Cygwin, allows remote attackers to read arbitrary files via a URL containing "..%5C" (dot dot encoded backslash) sequences.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =1.0.5 | |
Apache Http Server | =0.8.11 | |
Apache Http Server | =1.1.1 | |
Apache Http Server | =1.0.2 | |
Apache Http Server | =1.1 | |
Apache Http Server | =1.2.5 | |
Apache Http Server | =1.0 | |
Apache Http Server | =1.0.3 | |
Apache Http Server | =1.3 | |
Apache Http Server | =0.8.14 | |
Apache Http Server | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0173 is considered a moderate severity vulnerability due to its ability to expose sensitive files.
To mitigate CVE-2004-0173, upgrade to an unaffected version of Apache HTTP Server that is later than 1.3.29 and 2.0.48.
CVE-2004-0173 affects Apache HTTP Server versions 1.3.29 and earlier, and 2.0.48 and earlier, specifically when running on Cygwin.
CVE-2004-0173 exploits a directory traversal flaw by allowing attackers to read arbitrary files using encoded backslash sequences.
While CVE-2004-0173 is an older vulnerability, it remains a concern for any systems running outdated versions of Apache HTTP Server.