Details
Alert ID 20017
Alert Type Active
Status release
Risk High
CWE 20
WASC 20
Technologies Targeted Language / PHP
Tags CVE-2012-1823
CWE-20
OWASP_2017_A09
OWASP_2021_A06
More Info Scan Rule Help

Summary

Some PHP versions, when configured to run using CGI, do not correctly handle query strings that lack an unescaped “=” character, enabling PHP source code disclosure, and arbitrary code execution. In this case, the contents of the PHP file were served directly to the web browser. This output will typically contain PHP, although it may also contain straight HTML.

Solution

Upgrade to the latest stable version of PHP, or use the Apache web server and the mod_rewrite module to filter out malicious requests using the "RewriteCond" and "RewriteRule" directives.

Other Info

<?php $x=0; echo '<h1>Welcome!</h1>'; ?>

References

Code

org/zaproxy/zap/extension/ascanrules/SourceCodeDisclosureCve20121823ScanRule.java