Vulnerability Details : CVE-2003-0249
PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report.
Threat overview for CVE-2003-0249
Top countries where our scanners detected CVE-2003-0249
Top open port discovered on systems with this issue
80
IPs affected by CVE-2003-0249 100
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-0249!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0249
Probability of exploitation activity in the next 30 days: 0.23%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2003-0249
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0249
-
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=97
U.S. | Let There Be Change | AccentureVendor Advisory
Products affected by CVE-2003-0249
- cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:*