PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
Link | Tags |
---|---|
http://www.securiteam.com/windowsntfocus/5ZP030U60U.html | exploit |
http://www.securityfocus.com/bid/3786 | vdb entry |
http://www.iss.net/security_center/static/7815.php | vdb entry |