Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
** DISPUTED ** PHP绕过预期的访问限制漏洞
Vulnerability Description
** DISPUTED ** PHP将如"PoSt"的未知类函数作为GET请求,PHP运行在传送所有类函数的服务器上时,攻击者利用该漏洞绕过预期的访问限制,如Apache httpd 2.0版本使用限制指令。
CVSS Information
N/A
Vulnerability Type
N/A