PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.
http://marc.info/?l=bugtraq&m=101311698909691&w=2
Source: MITRE
Published: 2002-05-29
Updated: 2016-10-18
Type: NVD-CWE-Other
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM