Vulnerabilities > CVE-2002-2029 - Remote File Disclosure vulnerability in Apache Win32 PHP.EXE

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
apache
nessus
exploit available

Summary

PHP, when installed on Windows with Apache and ScriptAlias for /php/ set to c:/php/, allows remote attackers to read arbitrary files and possibly execute arbitrary programs via an HTTP request for php.exe with a filename in the query string.

Exploit-Db

descriptionApache 1.3.20 Win32 PHP.EXE Remote File Disclosure Vulnerability. CVE-2002-2029. Remote exploit for windows platform
idEDB-ID:21204
last seen2016-02-02
modified2002-01-04
published2002-01-04
reporterPaul Brereton
sourcehttps://www.exploit-db.com/download/21204/
titleApache 1.3.20 - Win32 PHP.EXE Remote File Disclosure Vulnerability

Nessus

NASL familyCGI abuses
NASL idPHP_APACHE_WIN32_DEFAULT.NASL
descriptionA configuration vulnerability exists for PHP.EXE cgi running on Apache for Win32 platforms. It is reported that the installation text recommends configuration options in httpd.conf that create a security vulnerability, allowing arbitrary files to be read from the host running PHP. Remote users can directly execute the PHP binary: http://www.somehost.com/php/php.exe?c:\winnt\win.ini
last seen2020-06-01
modified2020-06-02
plugin id10839
published2002-01-25
reporterThis script is Copyright (C) 2002-2018 Matt Moore
sourcehttps://www.tenable.com/plugins/nessus/10839
titleApache Win32 ScriptAlias php.exe Arbitrary File Access