Description
PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T23:20:36.803Z
Reserved: 2003-05-06T00:00:00.000Z
Link: CVE-2003-0249
No data.
Status : Deferred
Published: 2003-12-31T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2003-0249
No data.
OpenCVE Enrichment
No data.
Weaknesses