PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Http_server | Apache | 1.3.11 (including) | 1.3.11 (including) |
Http_server | Apache | 1.3.12 (including) | 1.3.12 (including) |
Http_server | Apache | 1.3.13 (including) | 1.3.13 (including) |
Http_server | Apache | 1.3.14 (including) | 1.3.14 (including) |
Http_server | Apache | 1.3.15 (including) | 1.3.15 (including) |
Http_server | Apache | 1.3.16 (including) | 1.3.16 (including) |
Http_server | Apache | 1.3.17 (including) | 1.3.17 (including) |
Http_server | Apache | 1.3.18 (including) | 1.3.18 (including) |
Http_server | Apache | 1.3.19 (including) | 1.3.19 (including) |
Http_server | Apache | 1.3.20 (including) | 1.3.20 (including) |