目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2012-1823— PHP ‘php-cgi’ 参数信息泄漏漏洞

KEV EPSS 94.36% · P100
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2012-1823 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
PHP ‘php-cgi’ 参数信息泄漏漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHP Group和开放源代码社区共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。 PHP中存在信息泄漏漏洞。远程攻击者可利用该漏洞在服务器进程上下文中查看文件的源代码,获取敏感信息,在受影响计算机上运行任意PHP代码,也可能执行其他攻击。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

神龙十问 — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

受影响产品

厂商产品影响版本CPE订阅
-n/a n/a -

二、漏洞 CVE-2012-1823 的公开POC

#POC 描述源链接神龙链接
1Nonehttps://github.com/drone789/CVE-2012-1823POC详情
2First script, pgp-cgi-cve-2012-1823 BASH scripthttps://github.com/tardummy01/oscp_scripts-1POC详情
3PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.https://github.com/Unix13/metasploitable2POC详情
4Nonehttps://github.com/cyberharsh/PHP_CVE-2012-1823POC详情
5PHP CGI Argument Injection RCEhttps://github.com/theykillmeslowly/CVE-2012-1823POC详情
6PHP CGI Argument Injection.https://github.com/0xl0k1/CVE-2012-1823POC详情
7Prova de conceito para PHP CGI Argument Injection (CVE-2012-1823)https://github.com/Fatalitysec/CVE-2012-1823POC详情
8Prova de conceito de PHP CGI Argument Injection.https://github.com/Fatalityx84/CVE-2012-1823POC详情
9Prova de conceito de php cgi argument injection https://github.com/0xFatality/CVE-2012-1823POC详情
10Nonehttps://github.com/Jimmy01240397/CVE-2012-1823-AnalyzePOC详情
11CVE-2012-1823 exploit for https user password website.https://github.com/JasonHobs/CVE-2012-1823-exploit-for-https-user-password-webPOC详情
12sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2012/CVE-2012-1823.yamlPOC详情
13Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/php-cgi-cve-2012-1823.ymlPOC详情
14https://github.com/vulhub/vulhub/blob/master/php/CVE-2012-1823/README.mdPOC详情
15CVE-2012-1823 exploit for https user password website.https://github.com/Dmitri131313/CVE-2012-1823-exploit-for-https-user-password-webPOC详情
16Ushbu videoda Kali Linux orqali Metasploitable 2 serveriga PHP CGI Argument Injection (CVE-2012-1823) ekspluatatsiyasi Metasploit yordamida amalga oshiriladihttps://github.com/nulltrace1336/PHP-CGI-Argument-Injection-ExploitPOC详情
17Automated Web Vulnerability Assessment of DVWA using OWASP ZAP to identify and analyze critical security flaws like Remote Code Execution (CVE-2012-1823).https://github.com/waburig/Open-Worldwide-Application-Security-Project-OWASP-POC详情
18A hands-on project demonstrating the setup of virtual security lab, network reconnaissance, and exploitation of CVE-2012-1823.https://github.com/hackherMind-Pixel/Vulnerable-Lab-ExploitationPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2012-1823 的情报信息

Please 登录 to view more intelligence information

同批安全公告 · n/a · 2012-05-11 · 共 19 条

CVE-2012-0656Apple Mac OS X ‘LoginUIFramework’ 竞争条件漏洞
CVE-2012-0676Apple Safari ‘WebKit’ 输入验证漏洞
CVE-2012-0675Apple Mac OS X ‘Time Machine’ 授权问题漏洞
CVE-2012-0662Apple Mac OS X ‘Security Framework’ 整数溢出漏洞
CVE-2012-0661Apple Mac OS X ‘QuickTime’ 释放后使用漏洞
CVE-2012-0660Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞
CVE-2012-0659Apple Mac OS X ‘QuickTime’ 整数溢出漏洞
CVE-2012-0658Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞
CVE-2012-0657Apple Mac OS X ‘Quartz Composer’ 权限许可和访问控制漏洞
CVE-2012-2311PHP SQL注入漏洞
CVE-2012-0655Apple Mac OS X ‘libsecurity’ 加密问题漏洞
CVE-2012-0654Apple Mac OS X ‘libsecurity’ 缓冲区溢出漏洞
CVE-2012-0652Apple Mac OS X ‘Login Window’ 信息泄露漏洞
CVE-2012-0651Apple Mac OS X ‘Directory Service’ 信息泄露漏洞
CVE-2012-0649Apple Mac OS X ‘blued’ 竞争条件漏洞
CVE-2012-2336PHP 输入验证错误漏洞
CVE-2012-2335PHP ‘php-wrapper.fcgi’ 权限许可和访问控制问题漏洞
CVE-2012-2329PHP ‘apache_request_headers’ 函数缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2012-1823

暂无评论


发表评论