9.8

CVE-2012-1823

Warning
Exploit

sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.

Data is provided by the National Vulnerability Database (NVD)
PhpPhp Version < 5.3.12
PhpPhp Version >= 5.4.0 < 5.4.2
FedoraprojectFedora Version39
FedoraprojectFedora Version40
DebianDebian Linux Version6.0
HpHp-ux Versionb.11.23
HpHp-ux Versionb.11.31
OpensuseOpensuse Version11.4
OpensuseOpensuse Version12.1
SuseLinux Enterprise Server Version10 Updatesp4 SwEdition-
SuseLinux Enterprise Server Version11 Updatesp2 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp2 SwPlatformvmware
ApplemacOS X Version >= 10.6.8 < 10.7.5
ApplemacOS X Version >= 10.8.0 < 10.8.2
RedhatApplication Stack Version2.0
RedhatStorage Version2.0
RedhatEnterprise Linux Eus Version5.6
RedhatEnterprise Linux Eus Version6.1
RedhatEnterprise Linux Eus Version6.2

25.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog

PHP-CGI Query String Parameter Vulnerability

Vulnerability

sapi/cgi/cgi_main.c in PHP, when configured as a CGI script, does not properly handle query strings, which allows remote attackers to execute arbitrary code.

Description

Apply updates per vendor instructions.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 94.39% 1
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
134c704f-9b21-4f2e-91b3-4a467353bcc0 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

http://www.kb.cert.org/vuls/id/520827
Third Party Advisory
US Government Resource
Exploit
http://www.kb.cert.org/vuls/id/673343
Third Party Advisory
US Government Resource
http://www.php.net/ChangeLog-5.php#5.4.2
Patch
Exploit
Release Notes
http://www.securitytracker.com/id?1027022
Third Party Advisory
Broken Link
VDB Entry