This issue was reported to bugtraq on 2004-09-15 http://www.securityfocus.com/archive/1/375370 Bad array parsing in the rfc1867.c file could lead to the overwriting of the $_FILES array, which in turn could allow an attacker to write arbitrary files with the permission of the user running apache. This issue also affects RHEL2.1
Created attachment 104908 [details] Patch from upstream CVS
OK. This is a (somewhat) subtle trick to bypass the sanity checking of the filename used for the uploaded file. But the code to do sanity checking of the filename was itself not added until after 4.3.2, so in fact no clever tricks are needed at all for this version.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-687.html