CVE-2012-1823

CRITICAL KEV NUCLEI

Php < 5.3.12 - Command Injection

Title source: rule

Description

sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.

Exploits (17)

nomisec WORKING POC 11 stars
by 0xl0k1 · remote
https://github.com/0xl0k1/CVE-2012-1823
nomisec WORKING POC 4 stars
by Unix13 · poc
https://github.com/Unix13/metasploitable2
nomisec WORKING POC 3 stars
by tardummy01 · remote
https://github.com/tardummy01/oscp_scripts-1
nomisec WRITEUP 1 stars
by hackherMind-Pixel · poc
https://github.com/hackherMind-Pixel/Vulnerable-Lab-Exploitation
nomisec SCANNER 1 stars
by Dmitri131313 · poc
https://github.com/Dmitri131313/CVE-2012-1823-exploit-for-https-user-password-web
nomisec WORKING POC 1 stars
by cyberharsh · poc
https://github.com/cyberharsh/PHP_CVE-2012-1823
nomisec SCANNER 1 stars
by drone789 · remote
https://github.com/drone789/CVE-2012-1823
nomisec WORKING POC
by tryj · poc
https://github.com/tryj/CVE-2012-1823---PHP-CGI---RCE
nomisec WRITEUP
by waburig · poc
https://github.com/waburig/Open-Worldwide-Application-Security-Project-OWASP-
nomisec WRITEUP
by nulltrace1336 · poc
https://github.com/nulltrace1336/PHP-CGI-Argument-Injection-Exploit
nomisec STUB
by Jimmy01240397 · poc
https://github.com/Jimmy01240397/CVE-2012-1823-Analyze
vulncheck_xdb WRITEUP
remote
https://github.com/lh-dang/anninhweb
exploitdb WORKING POC
pythonremotephp
https://www.exploit-db.com/exploits/18836
exploitdb WORKING POC
rubyremotephp
https://www.exploit-db.com/exploits/18834
exploitdb WORKING POC
pythonremotephp
https://www.exploit-db.com/exploits/29316
exploitdb WORKING POC
cremotephp
https://www.exploit-db.com/exploits/29290
metasploit WORKING POC EXCELLENT
by egypt, hdm, jjarmoc, kingcope, juan vazquez · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/php_cgi_arg_injection.rb

Nuclei Templates (1)

PHP CGI v5.3.12/5.4.2 Remote Code Execution
HIGHby pikpikcu
Shodan: cpe:"cpe:2.3:a:php:php"

References (31)

... and 11 more

Scores

CVSS v3 9.8
EPSS 0.9436
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2022-03-25
VulnCheck KEV 2012-06-19
InTheWild.io 2022-03-25
ENISA EUVD EUVD-2012-1833
CWE
CWE-77
Status published
Products (27)
apple/mac_os_x 10.6.8 - 10.7.5
debian/debian_linux 6.0
fedoraproject/fedora 39
fedoraproject/fedora 40
hp/hp-ux b.11.23
hp/hp-ux b.11.31
opensuse/opensuse 11.4
opensuse/opensuse 12.1
php/php < 5.3.12
redhat/application_stack 2.0
... and 17 more
Published May 11, 2012
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026