Description
Apache HTTP Server, when running on Linux with a document root on a Windows share mounted using smbfs, allows remote attackers to obtain unprocessed content such as source files for .php programs via a trailing "\" (backslash), which is not handled by the intended AddType directive.
Remediation
References
Related Vulnerabilities
WordPress Plugin Spam protection, AntiSpam, FireWall by CleanTalk Cross-Site Scripting (5.113)
Chamilo Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-13082)
WordPress Plugin Elementor Website Builder Arbitrary File Upload (2.7.4)
Oracle Database Server CVE-2012-3220 Vulnerability (CVE-2012-3220)