PT-2012-1212 · Php +4 · Php +4

Nielsdos

·

Published

2012-05-07

·

Updated

2025-11-07

·

CVE-2012-1823

CVSS v2.0
7.5
VectorAV:N/AC:L/Au:N/C:P/I:P/A:P
Name of the Vulnerable Software and Affected Versions PHP versions prior to 5.3.12 PHP versions 5.4.x prior to 5.4.2
Description The issue arises from insufficient input validation in the sapi/cgi/cgi main.c component of the PHP interpreter. This allows remote attackers to execute arbitrary code by placing command-line options in the query string, specifically when the query string lacks an equals sign character. The vulnerability is related to the lack of skipping a certain php getopt for the 'd' case.
Recommendations For PHP versions prior to 5.3.12, update to version 5.3.12 or later. For PHP versions 5.4.x prior to 5.4.2, update to version 5.4.2 or later. As a temporary workaround, consider restricting access to the CGI script to minimize the risk of exploitation.

Exploit

Fix

RCE

Command Injection

SQL injection

Weakness Enumeration

Related Identifiers

APACHEPHPCGI3DRCECHECK
APACHEPHPCGIRCECHECK
BDU:2021-04416
BDU:2022-02622
BDU:2022-02625
CESA-2012_0546
CVE-2012-1823
DSA-2465-1
ELSA-2012-0546
HPSBUX02791
OPENSUSE-SU-2012_0590-1
OPENSUSE-SU-2024:10290-1
OPENSUSE-SU-2024:10344-1
OPENSUSE-SU-2024:11169-1
RHSA-2012:0546
RHSA-2012:0547
RHSA-2012:0568
RHSA-2012:0569
RHSA-2012:0570
RHSA-2012_0546
RHSA-2012_0547
RHSA-2012_0568

Affected Products

Centos
Hp-Ux
Php
Red Hat
Suse