First published: Tue Dec 31 2002(Updated: )
PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | =1.3.16 | |
Apache HTTP server | =1.3.19 | |
Apache HTTP server | =1.3.20 | |
Apache HTTP server | =1.3.13 | |
Apache HTTP server | =1.3.18 | |
Apache HTTP server | =1.3.12 | |
Apache HTTP server | =1.3.17 | |
Apache HTTP server | =1.3.15 | |
Apache HTTP server | =1.3.14 | |
Apache HTTP server | =1.3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.