Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Sep 2000 21:02:15 -0400 (EDT)
From:      Igor Roshchin <str@giganda.komkon.org>
To:        security@freebsd.org
Cc:        ache@freebsd.org
Subject:   A new problem in apache ?
Message-ID:  <200010010102.VAA41966@giganda.komkon.org>

next in thread | raw e-mail | index | archive | help

Hello!

Since this information has not appeared on this list yet, I am just forwarding
what appeared on http://www.apacheweek.com/issues/00-09-22
and was quoted on BUGTRAQ yesterday.
(in case somebody didn't notice it)

I didn't find anything on the apache.org itself related to this problem yet.
(Neither a patch nor a new release is available yet)
However, www.apache.org is running a version that reports itself as 
Apache/1.3.13-dev Server at www.apache.org Port 80


Igor




> Date:     Sat, 30 Sep 2000 00:00:07 -0700
> From: Automatic digest processor <LISTSERV@LISTS.SECURITYFOCUS.COM>
> Subject:  BUGTRAQ Digest - 28 Sep 2000 to 29 Sep 2000 (#2000-219)
> To: Recipients of BUGTRAQ digests <BUGTRAQ@LISTS.SECURITYFOCUS.COM>
>
>
<..>


>
> --cMZZGAUNAKbTNcRMXARPPCaQdFUQGW
>
> Date:    Fri, 29 Sep 2000 12:39:11 +0200
> From:    Kevin van der Raad <k.van.der.raad@ITSEC.NL>
> Subject: Security vulnerability in Apache mod_rewrite
> MIME-Version: 1.0
> Content-Type: text/plain; charset=us-ascii
> Content-Transfer-Encoding: 7bit
>
> Hi,
>
> We stumbled across the following article and did not see this issue here
> in Bugtraq:
>
>
> >
> > http://www.apacheweek.com/issues/00-09-22
> >
> > Security vulnerability in mod_rewrite
> >
> > The Apache development list this week contains a fix for a security issue that affects previous
> > versions of Apache, including Apache 1.3.12. Apache is only vulnerable if you use mod_rewrite
> > and a specific case of the directive RewriteRule. If the result of a RewriteRule is a filename
> > that contains regular expression references then an attacker may be able to access any
> > file on the web server.
> >
> > Here are some example RewriteRule directives. The first is vulnerable, but the others are not
> >
> > 	RewriteRule    /test/(.*)		/usr/local/data/test-stuff/$1
> > 	RewriteRule    /more-icons/(.*)		/icons/$1
> > 	RewriteRule    /go/(.*)			http://www.apacheweek.com/$1
> >
> > The patch is currently being tested and will be part of the release of Apache 1.3.13. Until
> > then, users should check their configuration files and not use rules that map to a filename
> > such as the first example above.
> >
>
>
> --
>
> Kevin van der Raad <mailto:k.van.der.raad@itsec.nl>
>
> ITsec Nederland B.V. <http://www.itsec.nl>;
> Exploit & Vulnerability Alerting Service
>
> P.O. box 5120
> NL 2000 GC Haarlem
> Tel +31(0)23 542 05 78
> Fax +31(0)23 534 54 77
>
> --cMZZGAUNAKbTNcRMXARPPCaQdFUQGW
>

<..>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200010010102.VAA41966>