First published: Tue Dec 31 2002(Updated: )
PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =1.3.11 | |
Apache Http Server | =1.3.12 | |
Apache Http Server | =1.3.13 | |
Apache Http Server | =1.3.14 | |
Apache Http Server | =1.3.15 | |
Apache Http Server | =1.3.16 | |
Apache Http Server | =1.3.17 | |
Apache Http Server | =1.3.18 | |
Apache Http Server | =1.3.19 | |
Apache Http Server | =1.3.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2029 is considered a critical vulnerability due to its ability to allow remote file access and possible arbitrary code execution.
To fix CVE-2002-2029, you should upgrade to a non-vulnerable version of the Apache HTTP Server and ensure it is configured securely.
CVE-2002-2029 affects specific versions of Apache HTTP Server when installed on Windows with certain configurations.
Attackers can exploit CVE-2002-2029 to read arbitrary files and execute programs on vulnerable installations.
CVE-2002-2029 remains a risk for any systems still running the affected versions of Apache HTTP Server without necessary updates.