On Tue, Dec 13, 2011 at 9:50 PM, Knute Johnson <apa...@knutejohnson.com>wrote:

> This showed up in my log today on a Ubuntu server with Apache 2.2.17.
>
> A total of 3 possible successful probes were detected (the following URLs
>  contain strings that match one or more of a listing of strings that
>  indicate a possible exploit):
>
>    /?file=../../../../../../proc/**self/environ%00 HTTP Response 200
>    /?mod=../../../../../../proc/**self/environ%00 HTTP Response 200
>    /?page=../../../../../../proc/**self/environ%00 HTTP Response 200
>
> This can't actually return any data can it?
>

It should not return any data from Apache itself.
It will do something if you have an application set up that chooses what
file to display based on the query string.

- Y

Reply via email to