Description
Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to determine the full pathname of the server via (1) a request for a .var file, which leaks the pathname in the resulting error message, or (2) via an error message that occurs when a script (child process) cannot be invoked.
Remediation
References
Related Vulnerabilities
WordPress Plugin oQey Gallery 'gal_id' Parameter SQL Injection (0.4.8)
WordPress Plugin Migration, Backup, Staging-WPvivid Security Bypass (0.9.35)
Joomla Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2006-4471)
WordPress Plugin Improved Sale Badges for WooCommerce Security Bypass (4.3.2)