CVE-2012-1823

sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query...

Basic Information

CVE State
PUBLISHED
Reserved Date
March 21, 2012
Published Date
May 11, 2012
Last Updated
February 07, 2025
Vendor
PHP
Product
PHP
Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
Tags
php cisa nuclei_scanner metasploit_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

SSVC Information

Exploitation
active
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2022-03-25 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2025-02-16 23:45:55 UTC) Source

References

http://marc.info/?l=bugtraq&m=134012830914727&w=2 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html http://www.securitytracker.com/id?1027022 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html http://rhn.redhat.com/errata/RHSA-2012-0546.html http://rhn.redhat.com/errata/RHSA-2012-0568.html http://rhn.redhat.com/errata/RHSA-2012-0569.html http://www.php.net/ChangeLog-5.php#5.4.2 http://secunia.com/advisories/49014 http://rhn.redhat.com/errata/RHSA-2012-0570.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html https://bugs.php.net/bug.php?id=61910 http://www.kb.cert.org/vuls/id/673343 http://rhn.redhat.com/errata/RHSA-2012-0547.html http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html http://support.apple.com/kb/HT5501 http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ http://secunia.com/advisories/49065 http://www.kb.cert.org/vuls/id/520827 https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 http://marc.info/?l=bugtraq&m=134012830914727&w=2 http://www.debian.org/security/2012/dsa-2465 http://secunia.com/advisories/49085 http://www.php.net/archive/2012.php#id2012-05-03-1 http://secunia.com/advisories/49087 http://www.openwall.com/lists/oss-security/2024/06/07/1 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/

Known Exploited Vulnerability Information

Source Added Date
CISA 2022-03-25 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

php_cgi_arg_injection

Type: metasploit • Created: Unknown

Metasploit module for CVE-2012-1823

JasonHobs/CVE-2012-1823-exploit-for-https-user-password-web

Type: github • Created: 2025-02-16 23:45:55 UTC • Stars: 0

CVE-2012-1823 exploit for https user password website.

Jimmy01240397/CVE-2012-1823-Analyze

Type: github • Created: 2024-12-09 08:31:04 UTC • Stars: 0

0xl0k1/CVE-2012-1823

Type: github • Created: 2023-08-24 11:17:51 UTC • Stars: 9

PHP CGI Argument Injection.

cyberharsh/PHP_CVE-2012-1823

Type: github • Created: 2020-08-17 19:54:11 UTC • Stars: 0

drone789/CVE-2012-1823

Type: github • Created: 2015-09-08 14:37:25 UTC • Stars: 1

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Proof of Concept Exploit Available

  • Detected by Nuclei

  • Detected by Metasploit