PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-16T23:20:36.803Z

Reserved: 2003-05-06T00:00:00Z

Link: CVE-2003-0249

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2003-12-31T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2003-0249

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.