.. / CVE-2012-1823

Exploit for PHP CGI v5.3.12/5.4.2 Remote Code Execution (CVE-2012-1823)

Description:

sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the ā€˜dā€™ case.

Nuclei Template

View the template here CVE-2012-1823.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2012/CVE-2012-1823.yaml
Copy

References:

https://bugs.php.net/bug.php?id=61910
https://github.com/vulhub/vulhub/tree/master/php/CVE-2012-1823
http://www.php.net/ChangeLog-5.php#5.4.2
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
https://nvd.nist.gov/vuln/detail/CVE-2012-1823