Description
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Remediation
References
Related Vulnerabilities
WordPress Plugin Attachment File Icons (AF Icons) Cross-Site Request Forgery (1.3)
PHP Use After Free Vulnerability (CVE-2016-9936)
WordPress Plugin Auto ThickBox Plus Cross-Site Scripting (1.9)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-0123)
WordPress Plugin WordPress Photo Gallery by Gallery Bank SQL Injection (3.0.101)