PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Http_server | Apache | 1.3.16 | 1.3.16 |
Http_server | Apache | 1.3.19 | 1.3.19 |
Http_server | Apache | 1.3.20 | 1.3.20 |
Http_server | Apache | 1.3.13 | 1.3.13 |
Http_server | Apache | 1.3.18 | 1.3.18 |
Http_server | Apache | 1.3.12 | 1.3.12 |
Http_server | Apache | 1.3.17 | 1.3.17 |
Http_server | Apache | 1.3.15 | 1.3.15 |
Http_server | Apache | 1.3.14 | 1.3.14 |
Http_server | Apache | 1.3.11 | 1.3.11 |