Description
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
Remediation
References
Related Vulnerabilities
WordPress Plugin Chronoforms Cross-Site Request Forgery (7.0.9)
Atlassian Confluence Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2012-6342)
MySQL CVE-2020-14614 Vulnerability (CVE-2020-14614)
PHP Other Vulnerability (CVE-2007-1884)
WordPress Plugin ZWM Zeumic Work Management Multiple Unspecified Vulnerabilities (1.0.11)