CVE-2002-0249
CVSS5.0
发布时间 :2002-05-29 00:00:00
修订时间 :2016-10-17 22:17:35
NMCOS    

[原文]PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.


[CNNVD]Windows php.exe Apache 2路径泄露漏洞(CNNVD-200205-064)

        Windows的PHP在安装Apache 2.0.28测试版将其用作standalone CGI模块,远程攻击者可以借助畸形参数如/123的请求获取php.exe的物理路径,该漏洞会在错误信息中泄露路径名称。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0249
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0249
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-064
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101311698909691&w=2
(UNKNOWN)  BUGTRAQ  20020207 Security Advisory - #1
http://www.iss.net/security_center/static/8121.php
(UNKNOWN)  XF  php-123-path-information(8121)
http://www.securityfocus.com/bid/4056
(VENDOR_ADVISORY)  BID  4056

- 漏洞信息

Windows php.exe Apache 2路径泄露漏洞
中危 配置错误
2002-05-29 00:00:00 2006-04-07 00:00:00
远程  
        Windows的PHP在安装Apache 2.0.28测试版将其用作standalone CGI模块,远程攻击者可以借助畸形参数如/123的请求获取php.exe的物理路径,该漏洞会在错误信息中泄露路径名称。

- 公告与补丁

        It may be possible to surpress this information through the Apache configuration. This has not been confirmed.
        Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

827
PHP4 for Apache on Windows php.exe Malformed Request Path Disclosure
Information Disclosure
Loss of Confidentiality Solution Unknown

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-02-07 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apache 2 for Windows php.exe Path Disclosure Vulnerability
Configuration Error 4056
Yes No
2002-02-07 12:00:00 2009-07-11 10:56:00
Discovered by "Paul Brereton" <brereton_paul@btopenworld.com>.

- 受影响的程序版本

Apache Software Foundation Apache 2.0.28 Beta

- 漏洞讨论

Apache is a powerful, widely used web server available for most operating systems, including Linux, Windows and many other Unix like systems. Apache 2 is currently in development, and beta versions have been made available to the public.

A path disclosure vulnerability exists in the default configuration of some beta releases of Apache 2. If PHP is also installed with default values, it is possible to submit a malicious request to the web server such that the full path of the PHP interpreter is disclosed.

A url of the form http://host/file.php/123 will result in an error message, including in part the path of the file php.exe.

- 漏洞利用

This vulnerability can be exploited with a web browser.

- 解决方案

It may be possible to surpress this information through the Apache configuration. This has not been confirmed.

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站