ALAS-2012-077 --- phpID: oval:org.secpod.oval:def:1601302 | Date: (C)2020-11-27 (M)2022-11-29 |
Class: PATCH | Family: unix |
A flaw was found in the way the php-cgi executable processed command line arguments when running in CGI mode. A remote attacker could send a specially-crafted request to a PHP script that would result in the query string being parsed by php-cgi as command line options and arguments. This could lead to the disclosure of the script"s source code or arbitrary code execution with the privileges of the PHP interpreter
Platform: |
Amazon Linux AMI |