PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
References
Configurations
History
No history.
Information
Published : 2002-05-29 04:00
Updated : 2016-10-18 02:17
NVD link : CVE-2002-0249
Mitre link : CVE-2002-0249
CVE.ORG link : CVE-2002-0249
JSON object : View
Products Affected
apache
- http_server
CWE