PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.
2002-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | apache | http_server | 1.3.11 | Yes |
| Application | apache | http_server | 1.3.12 | Yes |
| Application | apache | http_server | 1.3.13 | Yes |
| Application | apache | http_server | 1.3.14 | Yes |
| Application | apache | http_server | 1.3.15 | Yes |
| Application | apache | http_server | 1.3.16 | Yes |
| Application | apache | http_server | 1.3.17 | Yes |
| Application | apache | http_server | 1.3.18 | Yes |
| Application | apache | http_server | 1.3.19 | Yes |
| Application | apache | http_server | 1.3.20 | Yes |