Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c95h-8x8w-895x

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

EPSS

Процентиль: 86%
0.02831
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.

EPSS

Процентиль: 86%
0.02831
Низкий