Critical severityNVD Advisory· Published Aug 5, 2025· Updated Apr 15, 2026
CVE-2012-10033
CVE-2012-10033
Description
Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/narcissus_backend_exec.rbnvd
- web.archive.org/web/20101127002623/https://narcissus.angstrom-distribution.org/nvd
- www.exploit-db.com/exploits/22709nvd
- www.exploit-db.com/exploits/22856nvd
- www.vulncheck.com/advisories/narcissus-image-config-command-injectionnvd
News mentions
0No linked articles in our index yet.