CVE-1999-0346: CGI PHP mlog script allows an attacker to read any file on the target server.
CGI PHP mlog script allows an attacker to read any file on the target server.
AI Analysis
Technical Summary
CVE-1999-0346 is a medium-severity vulnerability affecting the CGI PHP mlog script, part of the php_fi project, an early version of PHP. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the target server by exploiting insufficient input validation in the mlog script. Specifically, the script fails to properly sanitize user-supplied input, enabling directory traversal or direct file path manipulation to access sensitive files outside the intended directory scope. This can lead to disclosure of critical system files, configuration files, or application data, potentially exposing credentials, source code, or other sensitive information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk. However, the impact is limited to confidentiality as the vulnerability does not allow modification or deletion of files (integrity) nor does it affect system availability. The CVSS score of 5.0 reflects this medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impact on confidentiality only (C:P/I:N/A:N). No patches are available due to the age of the vulnerability and the obsolescence of the php_fi product. There are no known exploits in the wild currently documented, but the simplicity of the attack and the nature of the vulnerability mean it could be exploited if legacy systems are still in use.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information stored on servers running the vulnerable php_fi mlog script. This could include internal configuration files, user data, or proprietary source code. Such information disclosure could facilitate further attacks, including privilege escalation or lateral movement within the network. While modern PHP versions have long replaced php_fi, some legacy systems or archival servers in European organizations might still be running outdated software, especially in sectors with long system lifecycles such as government, education, or industrial control systems. The exposure of sensitive data could lead to compliance violations under GDPR if personal data is disclosed, resulting in legal and financial repercussions. Additionally, the vulnerability could undermine trust in affected organizations if confidential information is leaked. However, given the age and obsolescence of the affected software, the overall risk to most European organizations is low unless legacy systems are present.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory any legacy systems running php_fi or the vulnerable mlog script. 2) Immediately isolate or decommission these legacy systems from production networks to prevent exposure. 3) If legacy systems must remain operational, restrict network access to trusted internal users only, using network segmentation and firewall rules to limit exposure. 4) Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit directory traversal or arbitrary file read patterns targeting the mlog script. 5) Conduct regular security audits and vulnerability scans to detect the presence of vulnerable scripts. 6) Migrate legacy applications to supported, modern PHP versions and frameworks that have active security maintenance. 7) Implement strict file system permissions to limit the files accessible by web server processes, minimizing the impact of any arbitrary file read attempts. These steps go beyond generic advice by focusing on legacy system management, network segmentation, and compensating controls in absence of patches.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-1999-0346: CGI PHP mlog script allows an attacker to read any file on the target server.
Description
CGI PHP mlog script allows an attacker to read any file on the target server.
AI-Powered Analysis
Technical Analysis
CVE-1999-0346 is a medium-severity vulnerability affecting the CGI PHP mlog script, part of the php_fi project, an early version of PHP. The vulnerability allows an unauthenticated remote attacker to read arbitrary files on the target server by exploiting insufficient input validation in the mlog script. Specifically, the script fails to properly sanitize user-supplied input, enabling directory traversal or direct file path manipulation to access sensitive files outside the intended directory scope. This can lead to disclosure of critical system files, configuration files, or application data, potentially exposing credentials, source code, or other sensitive information. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk. However, the impact is limited to confidentiality as the vulnerability does not allow modification or deletion of files (integrity) nor does it affect system availability. The CVSS score of 5.0 reflects this medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impact on confidentiality only (C:P/I:N/A:N). No patches are available due to the age of the vulnerability and the obsolescence of the php_fi product. There are no known exploits in the wild currently documented, but the simplicity of the attack and the nature of the vulnerability mean it could be exploited if legacy systems are still in use.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential unauthorized disclosure of sensitive information stored on servers running the vulnerable php_fi mlog script. This could include internal configuration files, user data, or proprietary source code. Such information disclosure could facilitate further attacks, including privilege escalation or lateral movement within the network. While modern PHP versions have long replaced php_fi, some legacy systems or archival servers in European organizations might still be running outdated software, especially in sectors with long system lifecycles such as government, education, or industrial control systems. The exposure of sensitive data could lead to compliance violations under GDPR if personal data is disclosed, resulting in legal and financial repercussions. Additionally, the vulnerability could undermine trust in affected organizations if confidential information is leaked. However, given the age and obsolescence of the affected software, the overall risk to most European organizations is low unless legacy systems are present.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory any legacy systems running php_fi or the vulnerable mlog script. 2) Immediately isolate or decommission these legacy systems from production networks to prevent exposure. 3) If legacy systems must remain operational, restrict network access to trusted internal users only, using network segmentation and firewall rules to limit exposure. 4) Employ web application firewalls (WAFs) with custom rules to detect and block attempts to exploit directory traversal or arbitrary file read patterns targeting the mlog script. 5) Conduct regular security audits and vulnerability scans to detect the presence of vulnerable scripts. 6) Migrate legacy applications to supported, modern PHP versions and frameworks that have active security maintenance. 7) Implement strict file system permissions to limit the files accessible by web server processes, minimizing the impact of any arbitrary file read attempts. These steps go beyond generic advice by focusing on legacy system management, network segmentation, and compensating controls in absence of patches.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7de81b
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 11:11:54 PM
Last updated: 2/7/2026, 2:58:35 AM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumCVE-2026-25516: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-25581: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samclarke SCEditor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.