Critical severity9.8CISA KEVNVD Advisory· Published May 11, 2012· Updated Apr 21, 2026
CVE-2012-1823
CVE-2012-1823
Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
Affected products
28- cpe:2.3:a:redhat:application_stack:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:redhat:storage_for_public_cloud:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- bugs.php.net/patch-display.phpnvdPatch
- eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/nvdBroken LinkExploit
- www.kb.cert.org/vuls/id/520827nvdExploitThird Party AdvisoryUS Government Resource
- www.php.net/ChangeLog-5.phpnvdExploitPatchRelease Notes
- bugs.php.net/bug.phpnvdExploitPatch
- lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2012-05/msg00002.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2012-05/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2012-05/msg00011.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-0546.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-0547.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-0568.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-0569.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2012-0570.htmlnvdThird Party Advisory
- support.apple.com/kb/HT5501nvdThird Party Advisory
- www.debian.org/security/2012/dsa-2465nvdThird Party Advisory
- www.kb.cert.org/vuls/id/673343nvdThird Party AdvisoryUS Government Resource
- www.securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- h20000.www2.hp.com/bizsupport/TechSupport/Document.jspnvdBroken Link
- marc.infonvdMailing List
- secunia.com/advisories/49014nvdBroken Link
- secunia.com/advisories/49065nvdBroken Link
- secunia.com/advisories/49085nvdBroken Link
- secunia.com/advisories/49087nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.openwall.com/lists/oss-security/2024/06/07/1nvdMailing List
- www.php.net/archive/2012.phpnvdRelease Notes
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/nvdMailing ListRelease Notes
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/nvdMailing ListRelease Notes
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/nvdMailing ListRelease Notes
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
News mentions
0No linked articles in our index yet.