⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: Apply updates per vendor instructions..
CVE-2012-1823
Severity
9.8CRITICAL
EPSS
94.4%
top 0.03%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 11
KEV addedMar 25
KEV dueApr 15
Latest updateMay 14
CISA Required Action: Apply updates per vendor instructions.
Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages12 packages
Also affects: Debian Linux 6.0, Fedora 39, 40, Enterprise Linux 5.6, 6.1, 6.2, 5.3
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
5Nuclei▶
PHP CGI v5.3.12/5.4.2 Remote Code Execution
🔍Detection Rules
2📋Vendor Advisories
3🕵️Threat Intelligence
4Unit42▶
Network Attack Trends: Attackers Leveraging High Severity and Critical Exploits (May-July 2020)↗2020-09-15
💬Community
5Bugzilla
▶
Bugzilla
▶
Bugzilla▶
CVE-2012-1823 php: command line arguments injection when run in CGI mode (VU#520827) [fedora-all]↗2012-05-03