sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
06 Jan 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/bug.php?id=61910 - Exploit, Patch | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes |
16 Jul 2024, 17:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes | |
First Time |
Redhat
Apple mac Os X Redhat gluster Storage Server For On-premise Redhat application Stack Redhat enterprise Linux Workstation Fedoraproject Suse linux Enterprise Server Redhat enterprise Linux Server Debian Apple Redhat storage Opensuse opensuse Redhat storage For Public Cloud Redhat enterprise Linux Server Aus Hp Opensuse Fedoraproject fedora Redhat enterprise Linux Eus Debian debian Linux Redhat enterprise Linux Desktop Hp hp-ux Suse Suse linux Enterprise Software Development Kit |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:* |
13 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2012-05-11 10:15
Updated : 2025-04-11 00:51
NVD link : CVE-2012-1823
Mitre link : CVE-2012-1823
CVE.ORG link : CVE-2012-1823
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_desktop
- enterprise_linux_server_aus
- storage
- gluster_storage_server_for_on-premise
- storage_for_public_cloud
- enterprise_linux_eus
- enterprise_linux_server
- application_stack
php
- php
debian
- debian_linux
opensuse
- opensuse
hp
- hp-ux
apple
- mac_os_x
suse
- linux_enterprise_software_development_kit
- linux_enterprise_server
fedoraproject
- fedora
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')