CVE-2001-0731

Apache 1.3.20 with Multiviews enabled allows remote attackers to view directory contents and bypass the index page via a URL containing the "M=D" query string.
References
Link Resource
ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
http://www.apacheweek.com/issues/01-10-05#security Patch
http://www.redhat.com/support/errata/RHSA-2001-126.html
http://www.redhat.com/support/errata/RHSA-2001-164.html
http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net
http://www.securityfocus.com/bid/3009
https://exchange.xforce.ibmcloud.com/vulnerabilities/8275
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
http://www.apacheweek.com/issues/01-10-05#security Patch
http://www.redhat.com/support/errata/RHSA-2001-126.html
http://www.redhat.com/support/errata/RHSA-2001-164.html
http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net
http://www.securityfocus.com/bid/3009
https://exchange.xforce.ibmcloud.com/vulnerabilities/8275
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*

History

20 Nov 2024, 23:36

Type Values Removed Values Added
References () ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P - () ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P -
References () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077 - () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077 -
References () http://www.apacheweek.com/issues/01-10-05#security - Patch () http://www.apacheweek.com/issues/01-10-05#security - Patch
References () http://www.redhat.com/support/errata/RHSA-2001-126.html - () http://www.redhat.com/support/errata/RHSA-2001-126.html -
References () http://www.redhat.com/support/errata/RHSA-2001-164.html - () http://www.redhat.com/support/errata/RHSA-2001-164.html -
References () http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net - () http://www.securityfocus.com/archive/1/20010709214744.A28765%40brasscannon.net -
References () http://www.securityfocus.com/bid/3009 - () http://www.securityfocus.com/bid/3009 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/8275 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/8275 -
References () https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E - () https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E - () https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E - () https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E -
References () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E -

06 Jun 2021, 11:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E -

03 Jun 2021, 08:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E -
  • (MLIST) https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E -
  • (MLIST) https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E -

Information

Published : 2001-10-01 04:00

Updated : 2024-11-20 23:36


NVD link : CVE-2001-0731

Mitre link : CVE-2001-0731

CVE.ORG link : CVE-2001-0731


JSON object : View

Products Affected

apache

  • http_server