Skip to main content

CVE-1999-0346: CGI PHP mlog script allows an attacker to read any file on the target server.

Medium
VulnerabilityCVE-1999-0346cve-1999-0346
Published: Thu Oct 16 1997 (10/16/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: php
Product: php_fi

Description

CGI PHP mlog script allows an attacker to read any file on the target server.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:11:54 UTC

Technical Analysis

CVE-1999-0346 is a medium-severity vulnerability affecting the CGI PHP mlog script, part of the php_fi project, an early version of PHP. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the target server by exploiting insufficient input validation in the mlog script. Specifically, the script fails to properly sanitize user-supplied input, enabling directory traversal or direct file path manipulation to access sensitive files outside the intended directory scope. This can lead to disclosure of critical system files, configuration files, or application data, potentially exposing credentials, source code, or other sensitive information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk. However, the impact is limited to confidentiality as the vulnerability does not allow modification or deletion of files (integrity) nor does it affect system availability. The CVSS score of 5.0 reflects this medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impact on confidentiality only (C:P/I:N/A:N). No patches are available due to the age of the vulnerability and the obsolescence of the php_fi product. There are no known exploits in the wild currently documented, but the simplicity of the attack and the nature of the vulnerability mean it could be exploited if legacy systems are still in use.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information stored on servers running the vulnerable php_fi mlog script. This could include internal configuration files, user data, or proprietary source code. Such information disclosure could facilitate further attacks, including privilege escalation or lateral movement within the network. While modern PHP versions have long replaced php_fi, some legacy systems or archival servers in European organizations might still be running outdated software, especially in sectors with long system lifecycles such as government, education, or industrial control systems. The exposure of sensitive data could lead to compliance violations under GDPR if personal data is disclosed, resulting in legal and financial repercussions. Additionally, the vulnerability could undermine trust in affected organizations if confidential information is leaked. However, given the age and obsolescence of the affected software, the overall risk to most European organizations is low unless legacy systems are present.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory any legacy systems running php_fi or the vulnerable mlog script. 2) Immediately isolate or decommission these legacy systems from production networks to prevent exposure. 3) If legacy systems must remain operational, restrict network access to trusted internal users only, using network segmentation and firewall rules to limit exposure. 4) Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit directory traversal or arbitrary file read patterns targeting the mlog script. 5) Conduct regular security audits and vulnerability scans to detect the presence of vulnerable scripts. 6) Migrate legacy applications to supported, modern PHP versions and frameworks that have active security maintenance. 7) Implement strict file system permissions to limit the files accessible by web server processes, minimizing the impact of any arbitrary file read attempts. These steps go beyond generic advice by focusing on legacy system management, network segmentation, and compensating controls in absence of patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de81b

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 11:11:54 PM

Last updated: 7/26/2025, 3:53:24 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats