cve/2012/CVE-2012-1823.md

67 lines
3.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2012-1823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xl0k1/CVE-2012-1823
2024-06-07 17:53:02 +00:00
- https://github.com/0xsyr0/OSCP
2024-05-26 14:27:05 +02:00
- https://github.com/1060275195/Covid-v2-Botnet
- https://github.com/404tk/lazyscan
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Andriamradokely/Warchall-Solutions
- https://github.com/BCyberSavvy/Python
- https://github.com/BitTheByte/Eagle
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CyberSavvy/python-pySecurity
2024-06-07 04:52:01 +00:00
- https://github.com/Fatalitysec/CVE-2012-1823
2024-05-26 14:27:05 +02:00
- https://github.com/J-16/Pentester-Bootcamp
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/MrScytheLULZ/covid
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/R0B1NL1N/webappurls
- https://github.com/RootUp/AutoSploit
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Soundaryakambhampati/test-6
- https://github.com/Unix13/metasploitable2
- https://github.com/Vibragence/Dockersploit
2024-06-22 09:37:59 +00:00
- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
2024-05-26 14:27:05 +02:00
- https://github.com/ajread4/cve_pull
- https://github.com/alex14324/Eagel
- https://github.com/beched/libpywebhack
2024-06-22 09:37:59 +00:00
- https://github.com/bl4cksku11/CVE-2024-4577
2024-05-26 14:27:05 +02:00
- https://github.com/cyberdeception/deepdig
- https://github.com/cyberharsh/PHP_CVE-2012-1823
- https://github.com/daai1/CVE-2012-1823
- https://github.com/drone789/CVE-2012-1823
- https://github.com/infodox/exploits
- https://github.com/kalivim/pySecurity
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
- https://github.com/krishpranav/autosploit
- https://github.com/marcocastro100/Intrusion_Detection_System-Python
- https://github.com/panduki/SIE
- https://github.com/psifertex/ctf-vs-the-real-world
- https://github.com/pwnwiki/webappurls
- https://github.com/slxwzk/slxwzkBotnet
- https://github.com/smartFlash/pySecurity
- https://github.com/suin-xoops/xoopscube-preloads
- https://github.com/tardummy01/oscp_scripts-1
- https://github.com/theGreenJedi/Hacker-Guides
- https://github.com/theykillmeslowly/CVE-2012-1823
- https://github.com/zhibx/fscan-Intranet
2024-06-10 07:22:43 +00:00
- https://github.com/zomasec/CVE-2024-4577
2024-05-26 14:27:05 +02:00