PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
References
Configurations
Information
Published : 2002-05-28 21:00
Updated : 2016-10-17 19:17
NVD link : CVE-2002-0249
Mitre link : CVE-2002-0249
JSON object : View
CWE
Products Affected
apache
- http_server