CVE-2012-2311

EXPLOITED

Php < 5.3.12 - SQL Injection

Title source: rule

Description

sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.

Exploits (4)

exploitdb WORKING POC
pythonremotephp
https://www.exploit-db.com/exploits/18836
exploitdb WORKING POC
rubyremotephp
https://www.exploit-db.com/exploits/18834
exploitdb WORKING POC
pythonremotephp
https://www.exploit-db.com/exploits/29316
exploitdb WORKING POC
cremotephp
https://www.exploit-db.com/exploits/29290

Scores

EPSS 0.7453
EPSS Percentile 98.9%

Details

VulnCheck KEV 2012-05-09
CWE
CWE-89
Status published
Products (46)
php/php 1.0
php/php 2.0
php/php 2.0b10
php/php 3.0
php/php 3.0.1
php/php 3.0.2
php/php 3.0.3
php/php 3.0.4
php/php 3.0.5
php/php 3.0.6
... and 36 more
Published May 11, 2012
Tracked Since Feb 18, 2026