sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/bug.php?id=61910 - Exploit, Patch | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes |
16 Jul 2024, 17:48
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.4.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.17:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:* cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* |
cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:* cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:b.11.23:*:*:*:*:*:*:* cpe:2.3:a:redhat:storage:2.0:*:*:*:*:*:*:* cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* |
References | () http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ - Broken Link, Exploit | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - Broken Link | |
References | () http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=134012830914727&w=2 - Mailing List | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0546.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0547.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0568.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0569.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2012-0570.html - Third Party Advisory | |
References | () http://secunia.com/advisories/49014 - Broken Link | |
References | () http://secunia.com/advisories/49065 - Broken Link | |
References | () http://secunia.com/advisories/49085 - Broken Link | |
References | () http://secunia.com/advisories/49087 - Broken Link | |
References | () http://support.apple.com/kb/HT5501 - Third Party Advisory | |
References | () http://www.debian.org/security/2012/dsa-2465 - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/520827 - Exploit, Third Party Advisory, US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/673343 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 - Broken Link | |
References | () http://www.openwall.com/lists/oss-security/2024/06/07/1 - Mailing List | |
References | () http://www.php.net/ChangeLog-5.php#5.4.2 - Exploit, Patch, Release Notes | |
References | () http://www.php.net/archive/2012.php#id2012-05-03-1 - Release Notes | |
References | () http://www.securitytracker.com/id?1027022 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1 - Patch | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ - Mailing List, Release Notes | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ - Mailing List, Release Notes | |
First Time |
Redhat application Stack
Apple Hp hp-ux Redhat Hp Debian Fedoraproject fedora Suse linux Enterprise Software Development Kit Opensuse Redhat enterprise Linux Server Aus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Redhat enterprise Linux Workstation Redhat storage For Public Cloud Apple mac Os X Redhat enterprise Linux Eus Debian debian Linux Opensuse opensuse Redhat gluster Storage Server For On-premise Suse linux Enterprise Server Redhat storage Suse Fedoraproject |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
13 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2012-05-11 10:15
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1823
Mitre link : CVE-2012-1823
CVE.ORG link : CVE-2012-1823
JSON object : View
Products Affected
redhat
- storage
- gluster_storage_server_for_on-premise
- enterprise_linux_eus
- application_stack
- enterprise_linux_workstation
- storage_for_public_cloud
- enterprise_linux_desktop
- enterprise_linux_server_aus
- enterprise_linux_server
suse
- linux_enterprise_software_development_kit
- linux_enterprise_server
opensuse
- opensuse
fedoraproject
- fedora
apple
- mac_os_x
hp
- hp-ux
debian
- debian_linux
php
- php
CWE