PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote malicious users to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 1.3.11 |
||
apache http server 1.3.12 |
||
apache http server 1.3.13 |
||
apache http server 1.3.14 |
||
apache http server 1.3.15 |
||
apache http server 1.3.16 |
||
apache http server 1.3.17 |
||
apache http server 1.3.18 |
||
apache http server 1.3.19 |
||
apache http server 1.3.20 |