PHP for Windows, when installed on Apache 2.0.28 beta as a standalone CGI module, allows remote attackers to obtain the physical path of the php.exe via a request with malformed arguments such as /123, which leaks the pathname in the error message.Referenceshttp://marc.info/?l=bugtraq&m=101311698909691&w=2http://www.securityfocus.com/bid/4056http://www.iss.net/security_center/static/8121.php