First published: Fri May 03 2002(Updated: )
PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =2.0.28-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0249 is classified as a medium severity vulnerability due to potential information disclosure.
To fix CVE-2002-0249, upgrade to a later version of Apache HTTP Server that does not use PHP as a CGI module.
CVE-2002-0249 enables attackers to obtain the physical path of the php.exe file through specially crafted requests.
CVE-2002-0249 specifically affects Apache HTTP Server version 2.0.28 beta when PHP is installed as a standalone CGI.
You can determine vulnerability to CVE-2002-0249 by checking if your Apache installation is version 2.0.28 beta and if PHP is configured as a CGI.