Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2012-1823

KEV EPSS 94.36% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2012-1823

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHP ‘php-cgi’ 参数信息泄漏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHP Group和开放源代码社区共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。 PHP中存在信息泄漏漏洞。远程攻击者可利用该漏洞在服务器进程上下文中查看文件的源代码,获取敏感信息,在受影响计算机上运行任意PHP代码,也可能执行其他攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2012-1823

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/drone789/CVE-2012-1823POC Details
2First script, pgp-cgi-cve-2012-1823 BASH scripthttps://github.com/tardummy01/oscp_scripts-1POC Details
3PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.https://github.com/Unix13/metasploitable2POC Details
4Nonehttps://github.com/cyberharsh/PHP_CVE-2012-1823POC Details
5PHP CGI Argument Injection RCEhttps://github.com/theykillmeslowly/CVE-2012-1823POC Details
6PHP CGI Argument Injection.https://github.com/0xl0k1/CVE-2012-1823POC Details
7Prova de conceito para PHP CGI Argument Injection (CVE-2012-1823)https://github.com/Fatalitysec/CVE-2012-1823POC Details
8Prova de conceito de PHP CGI Argument Injection.https://github.com/Fatalityx84/CVE-2012-1823POC Details
9Prova de conceito de php cgi argument injection https://github.com/0xFatality/CVE-2012-1823POC Details
10Nonehttps://github.com/Jimmy01240397/CVE-2012-1823-AnalyzePOC Details
11CVE-2012-1823 exploit for https user password website.https://github.com/JasonHobs/CVE-2012-1823-exploit-for-https-user-password-webPOC Details
12sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2012/CVE-2012-1823.yamlPOC Details
13Nonehttps://github.com/chaitin/xray-plugins/blob/main/poc/manual/php-cgi-cve-2012-1823.ymlPOC Details
14https://github.com/vulhub/vulhub/blob/master/php/CVE-2012-1823/README.mdPOC Details
15CVE-2012-1823 exploit for https user password website.https://github.com/Dmitri131313/CVE-2012-1823-exploit-for-https-user-password-webPOC Details
16Ushbu videoda Kali Linux orqali Metasploitable 2 serveriga PHP CGI Argument Injection (CVE-2012-1823) ekspluatatsiyasi Metasploit yordamida amalga oshiriladihttps://github.com/nulltrace1336/PHP-CGI-Argument-Injection-ExploitPOC Details
17Automated Web Vulnerability Assessment of DVWA using OWASP ZAP to identify and analyze critical security flaws like Remote Code Execution (CVE-2012-1823).https://github.com/waburig/Open-Worldwide-Application-Security-Project-OWASP-POC Details
18A hands-on project demonstrating the setup of virtual security lab, network reconnaissance, and exploitation of CVE-2012-1823.https://github.com/hackherMind-Pixel/Vulnerable-Lab-ExploitationPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2012-1823

登录查看更多情报信息。

Same Patch Batch · n/a · 2012-05-11 · 19 CVEs total

CVE-2012-0656Apple Mac OS X ‘LoginUIFramework’ 竞争条件漏洞
CVE-2012-0676Apple Safari ‘WebKit’ 输入验证漏洞
CVE-2012-0675Apple Mac OS X ‘Time Machine’ 授权问题漏洞
CVE-2012-0662Apple Mac OS X ‘Security Framework’ 整数溢出漏洞
CVE-2012-0661Apple Mac OS X ‘QuickTime’ 释放后使用漏洞
CVE-2012-0660Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞
CVE-2012-0659Apple Mac OS X ‘QuickTime’ 整数溢出漏洞
CVE-2012-0658Apple Mac OS X ‘QuickTime’ 缓冲区溢出漏洞
CVE-2012-0657Apple Mac OS X ‘Quartz Composer’ 权限许可和访问控制漏洞
CVE-2012-2311PHP SQL注入漏洞
CVE-2012-0655Apple Mac OS X ‘libsecurity’ 加密问题漏洞
CVE-2012-0654Apple Mac OS X ‘libsecurity’ 缓冲区溢出漏洞
CVE-2012-0652Apple Mac OS X ‘Login Window’ 信息泄露漏洞
CVE-2012-0651Apple Mac OS X ‘Directory Service’ 信息泄露漏洞
CVE-2012-0649Apple Mac OS X ‘blued’ 竞争条件漏洞
CVE-2012-2336PHP 输入验证错误漏洞
CVE-2012-2335PHP ‘php-wrapper.fcgi’ 权限许可和访问控制问题漏洞
CVE-2012-2329PHP ‘apache_request_headers’ 函数缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2012-1823

No comments yet


Leave a comment