Apache Win32 ScriptAlias php.exe Arbitrary File Access

medium Nessus Plugin ID 10839

Synopsis

Arbitrary files may be read on the remote host.

Description

A configuration vulnerability exists for PHP.EXE cgi running on Apache for Win32 platforms. It is reported that the installation text recommends configuration options in httpd.conf that create a security vulnerability, allowing arbitrary files to be read from the host running PHP. Remote users can directly execute the PHP binary:

http://www.somehost.com/php/php.exe?c:\winnt\win.ini

Solution

Obtain the latest version from http://www.php.net

See Also

http://www.securitytracker.com/alerts/2002/Jan/1003104.html

http://www.php.net

Plugin Details

Severity: Medium

ID: 10839

File Name: php_apache_win32_default.nasl

Version: 1.27

Type: remote

Family: CGI abuses

Published: 1/25/2002

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:php:php

Required KB Items: www/PHP

Exploit Ease: No exploit is required

Vulnerability Publication Date: 1/4/2002

Reference Information

CVE: CVE-2002-2029

BID: 3786