Arbitrary PHP file execution vulnerability in Windows. Affected system: PHPversion4.1.1underWindowsPHPversion4.0.4underWindows vulnerability description: for PHP in Windows, use PHP. EXE to attack the affected system:
PHP version 4.1.1 under Windows
PHP version 4.0.4 under Windows
Vulnerability description:
In PHP in Windows, through PHP. EXE, attackers can make any file as a php file, even if the file extension is not PHP. For example, upload a file, but the extension is mp3, txt, or gif, and then require PHP to execute it.
For example:
Upload a gif file, but it is actually a php script file. the file content is as follows:
#------------
Phpinfo ();
?>
#------------
Then attackers use PHP to execute:
Http://www.example.com/php/php.exe/UPLOAD_DIRECTORY/huh.gif
Invalid PHP version 4.1.1 under Windows PHP version 4.0.4 under Windows vulnerability description: PHP in Windows, attacking through PHP. EXE...