sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
06 Jan 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () https://bugs.php.net/bug.php?id=61910 - Exploit, Patch | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49014 - Broken Link |
16 Jul 2024, 17:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* |
cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* |
First Time |
Suse linux Enterprise Server
Apple Redhat storage For Public Cloud Fedoraproject fedora Redhat storage Opensuse Debian debian Linux Redhat enterprise Linux Server Suse Hp Redhat Redhat enterprise Linux Desktop Fedoraproject Opensuse opensuse Debian Hp hp-ux Redhat enterprise Linux Server Aus Redhat enterprise Linux Workstation Apple mac Os X Redhat enterprise Linux Eus Redhat application Stack Redhat gluster Storage Server For On-premise Suse linux Enterprise Software Development Kit |
|
References | (CERT-VN) http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | (HP) http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/49065 - Broken Link | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/49085 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | (SECUNIA) http://secunia.com/advisories/49014 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/49087 - Broken Link | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | (CONFIRM) http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | (CONFIRM) http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | (SECTRACK) http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | (DEBIAN) http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | (MISC) http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | (CONFIRM) http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes |
13 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2012-05-11 10:15
Updated : 2025-02-19 19:45
NVD link : CVE-2012-1823
Mitre link : CVE-2012-1823
JSON object : View
Products Affected
php
- php
debian
- debian_linux
redhat
- enterprise_linux_server
- application_stack
- storage
- enterprise_linux_desktop
- gluster_storage_server_for_on-premise
- enterprise_linux_eus
- enterprise_linux_server_aus
- enterprise_linux_workstation
- storage_for_public_cloud
fedoraproject
- fedora
hp
- hp-ux
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
apple
- mac_os_x
opensuse
- opensuse
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')