CVE-2002-0249

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*

History

20 Nov 2024, 23:38

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=101311698909691&w=2 - () http://marc.info/?l=bugtraq&m=101311698909691&w=2 -
References () http://www.iss.net/security_center/static/8121.php - () http://www.iss.net/security_center/static/8121.php -
References () http://www.securityfocus.com/bid/4056 - Vendor Advisory () http://www.securityfocus.com/bid/4056 - Vendor Advisory

Information

Published : 2002-05-29 04:00

Updated : 2024-11-20 23:38


NVD link : CVE-2002-0249

Mitre link : CVE-2002-0249

CVE.ORG link : CVE-2002-0249


JSON object : View

Products Affected

apache

  • http_server