sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
06 Jan 2025, 19:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-77 |
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/bug.php?id=61910 - Exploit, Patch | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes |
16 Jul 2024, 17:48
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat
Apple mac Os X Redhat gluster Storage Server For On-premise Redhat application Stack Redhat enterprise Linux Workstation Fedoraproject Suse linux Enterprise Server Redhat enterprise Linux Server Debian Apple Redhat storage Opensuse opensuse Redhat storage For Public Cloud Redhat enterprise Linux Server Aus Hp Opensuse Fedoraproject fedora Redhat enterprise Linux Eus Debian debian Linux Redhat enterprise Linux Desktop Hp hp-ux Suse Suse linux Enterprise Software Development Kit |
|
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:* |
13 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2012-05-11 10:15
Updated : 2025-04-11 00:51
NVD link : CVE-2012-1823
Mitre link : CVE-2012-1823
CVE.ORG link : CVE-2012-1823
JSON object : View
Products Affected
redhat
- storage
- enterprise_linux_eus
- enterprise_linux_desktop
- storage_for_public_cloud
- gluster_storage_server_for_on-premise
- application_stack
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_workstation
php
- php
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
fedoraproject
- fedora
apple
- mac_os_x
opensuse
- opensuse
debian
- debian_linux
hp
- hp-ux
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')