Good afternoon, there are vulnerabilities on the site, for example, with the help of such a request:
"POST /local-bin/php/?-d allow_url_include=on -d safe_mode=off -d suhosin.simulation=on -d disable_functions="" -d open_basedir=none -d auto_prepend_file=php://input -n A file has been created and executed on the server. From the side of php - everything seems to be clear here - directives are redefined, and then load the file and execute it. It is not clear why the web server allowed overriding these directives through the usual http request to /local-bin/php/?... ?
How to prevent?
Thank.