PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=101311698909691&w=2 | mailing list |
http://www.securityfocus.com/bid/4056 | vdb entry vendor advisory |
http://www.iss.net/security_center/static/8121.php | vdb entry |