PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Http_server | Apache | 2.0.28-beta (including) | 2.0.28-beta (including) |