search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Apache discloses source code via POST requests to a location with WebDAV and CGI enabled

Vulnerability Note VU#910713

Original Release Date: 2002-10-29 | Last Revised: 2002-11-19

Overview

There is an information leakage in Apache that results from an interaction between WebDAV and CGI.

Description

Apache version 2.0.42 allows remote attackers to obtain the source code of CGI scripts that are stored in locations for which both CGI and WebDAV are enabled. When a POST request is sent to a CGI script on an affected server, this vulnerability will cause the source code of the script to be returned to the attacker.

Impact

Remote attackers can obtain the source code of CGI scripts located on affected servers.

Solution

Apply a patch from your vendor

This vulnerability was addressed in Apache version 2.0.43, available at http://httpd.apache.org/download.cgi. For vendor-specific information regarding this issue, please see the Systems Affected section of this document.

Vendor Information

910713
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This document was written by Jeffrey P. Lanza and is based upon information provided by Apache.org.

Other Information

CVE IDs: CVE-2002-1156
Severity Metric: 16.88
Date Public: 2002-09-26
Date First Published: 2002-10-29
Date Last Updated: 2002-11-19 22:19 UTC
Document Revision: 11

Sponsored by CISA.