{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2012-1823","assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","dateUpdated":"2025-11-04T17:11:54.860Z","dateReserved":"2012-03-21T00:00:00.000Z","datePublished":"2012-05-11T10:00:00.000Z"},"containers":{"cna":{"providerMetadata":{"orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc","dateUpdated":"2024-06-13T04:06:14.603Z"},"descriptions":[{"lang":"en","value":"sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case."}],"affected":[{"vendor":"n/a","product":"n/a","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"name":"SSRT100856","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2"},{"name":"SUSE-SU-2012:0604","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html"},{"name":"1027022","tags":["vdb-entry"],"url":"http://www.securitytracker.com/id?1027022"},{"name":"HPSBMU02786","tags":["vendor-advisory"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"},{"name":"MDVSA-2012:068","tags":["vendor-advisory"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:068"},{"name":"openSUSE-SU-2012:0590","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html"},{"name":"RHSA-2012:0546","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0546.html"},{"name":"RHSA-2012:0568","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0568.html"},{"name":"RHSA-2012:0569","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0569.html"},{"url":"http://www.php.net/ChangeLog-5.php#5.4.2"},{"name":"49014","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/49014"},{"name":"RHSA-2012:0570","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0570.html"},{"name":"SUSE-SU-2012:0598","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html"},{"url":"https://bugs.php.net/bug.php?id=61910"},{"name":"VU#673343","tags":["third-party-advisory"],"url":"http://www.kb.cert.org/vuls/id/673343"},{"name":"RHSA-2012:0547","tags":["vendor-advisory"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0547.html"},{"name":"APPLE-SA-2012-09-19-2","tags":["vendor-advisory"],"url":"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"},{"url":"http://support.apple.com/kb/HT5501"},{"url":"http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/"},{"name":"49065","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/49065"},{"name":"VU#520827","tags":["third-party-advisory"],"url":"http://www.kb.cert.org/vuls/id/520827"},{"url":"https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1"},{"name":"SSRT100877","tags":["vendor-advisory"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"},{"name":"HPSBUX02791","tags":["vendor-advisory"],"url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2"},{"name":"DSA-2465","tags":["vendor-advisory"],"url":"http://www.debian.org/security/2012/dsa-2465"},{"name":"49085","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/49085"},{"url":"http://www.php.net/archive/2012.php#id2012-05-03-1"},{"name":"49087","tags":["third-party-advisory"],"url":"http://secunia.com/advisories/49087"},{"name":"[oss-security] 20240606 PHP security releases 8.3.8, 8.2.20, and 8.1.29","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2024/06/07/1"},{"name":"FEDORA-2024-49aba7b305","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"},{"name":"FEDORA-2024-52c23ef1ec","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"}],"problemTypes":[{"descriptions":[{"type":"text","lang":"en","description":"n/a"}]}],"datePublic":"2012-05-03T00:00:00.000Z"},"adp":[{"title":"CVE Program Container","references":[{"name":"SSRT100856","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2"},{"name":"SUSE-SU-2012:0604","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.html"},{"name":"1027022","tags":["vdb-entry","x_transferred"],"url":"http://www.securitytracker.com/id?1027022"},{"name":"HPSBMU02786","tags":["vendor-advisory","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"},{"name":"MDVSA-2012:068","tags":["vendor-advisory","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:068"},{"name":"openSUSE-SU-2012:0590","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.html"},{"name":"RHSA-2012:0546","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0546.html"},{"name":"RHSA-2012:0568","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0568.html"},{"name":"RHSA-2012:0569","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0569.html"},{"url":"http://www.php.net/ChangeLog-5.php#5.4.2","tags":["x_transferred"]},{"name":"49014","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/49014"},{"name":"RHSA-2012:0570","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0570.html"},{"name":"SUSE-SU-2012:0598","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.html"},{"url":"https://bugs.php.net/bug.php?id=61910","tags":["x_transferred"]},{"name":"VU#673343","tags":["third-party-advisory","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/673343"},{"name":"RHSA-2012:0547","tags":["vendor-advisory","x_transferred"],"url":"http://rhn.redhat.com/errata/RHSA-2012-0547.html"},{"name":"APPLE-SA-2012-09-19-2","tags":["vendor-advisory","x_transferred"],"url":"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"},{"url":"http://support.apple.com/kb/HT5501","tags":["x_transferred"]},{"url":"http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/","tags":["x_transferred"]},{"name":"49065","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/49065"},{"name":"VU#520827","tags":["third-party-advisory","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/520827"},{"url":"https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1","tags":["x_transferred"]},{"name":"SSRT100877","tags":["vendor-advisory","x_transferred"],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"},{"name":"HPSBUX02791","tags":["vendor-advisory","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=134012830914727&w=2"},{"name":"DSA-2465","tags":["vendor-advisory","x_transferred"],"url":"http://www.debian.org/security/2012/dsa-2465"},{"name":"49085","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/49085"},{"url":"http://www.php.net/archive/2012.php#id2012-05-03-1","tags":["x_transferred"]},{"name":"49087","tags":["third-party-advisory","x_transferred"],"url":"http://secunia.com/advisories/49087"},{"name":"[oss-security] 20240606 PHP security releases 8.3.8, 8.2.20, and 8.1.29","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2024/06/07/1"},{"name":"FEDORA-2024-49aba7b305","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"},{"name":"FEDORA-2024-52c23ef1ec","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-04T17:11:54.860Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2012-1823","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-07T13:10:55.600294Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2022-03-25","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-1823"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-1823","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}],"timeline":[{"time":"2022-03-25T00:00:00.000Z","lang":"en","value":"CVE-2012-1823 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-22T00:05:47.580Z"}}]},"dataVersion":"5.2"}