PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
References
Configurations
History
20 Nov 2024, 23:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=101311698909691&w=2 - | |
References | () http://www.iss.net/security_center/static/8121.php - | |
References | () http://www.securityfocus.com/bid/4056 - Vendor Advisory |
Information
Published : 2002-05-29 04:00
Updated : 2024-11-20 23:38
NVD link : CVE-2002-0249
Mitre link : CVE-2002-0249
CVE.ORG link : CVE-2002-0249
JSON object : View
Products Affected
apache
- http_server
CWE