First published: Wed Dec 31 2003(Updated: )
** DISPUTED ** PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0249 is considered to be of low severity as it has been disputed and may not represent a widespread vulnerability.
To mitigate CVE-2003-0249, ensure your PHP configuration restricts method handling or update to a supported version of PHP.
PHP version 4.4.6 is specifically noted as affected by CVE-2003-0249.
CVE-2003-0249 is largely considered outdated and less relevant today due to the evolution of PHP and web server configurations.
CVE-2003-0249 exploits the handling of unknown HTTP request methods in PHP, allowing possible bypass of access restrictions.