mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
67 lines
3.0 KiB
Markdown
67 lines
3.0 KiB
Markdown
### [CVE-2012-1823](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/0xl0k1/CVE-2012-1823
|
|
- https://github.com/0xsyr0/OSCP
|
|
- https://github.com/1060275195/Covid-v2-Botnet
|
|
- https://github.com/404tk/lazyscan
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Andriamradokely/Warchall-Solutions
|
|
- https://github.com/BCyberSavvy/Python
|
|
- https://github.com/BitTheByte/Eagle
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CyberSavvy/python-pySecurity
|
|
- https://github.com/Fatalitysec/CVE-2012-1823
|
|
- https://github.com/J-16/Pentester-Bootcamp
|
|
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
|
- https://github.com/MrScytheLULZ/covid
|
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/R0B1NL1N/webappurls
|
|
- https://github.com/RootUp/AutoSploit
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/Soundaryakambhampati/test-6
|
|
- https://github.com/Unix13/metasploitable2
|
|
- https://github.com/Vibragence/Dockersploit
|
|
- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
|
|
- https://github.com/ajread4/cve_pull
|
|
- https://github.com/alex14324/Eagel
|
|
- https://github.com/beched/libpywebhack
|
|
- https://github.com/bl4cksku11/CVE-2024-4577
|
|
- https://github.com/cyberdeception/deepdig
|
|
- https://github.com/cyberharsh/PHP_CVE-2012-1823
|
|
- https://github.com/daai1/CVE-2012-1823
|
|
- https://github.com/drone789/CVE-2012-1823
|
|
- https://github.com/infodox/exploits
|
|
- https://github.com/kalivim/pySecurity
|
|
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
|
|
- https://github.com/krishpranav/autosploit
|
|
- https://github.com/marcocastro100/Intrusion_Detection_System-Python
|
|
- https://github.com/panduki/SIE
|
|
- https://github.com/psifertex/ctf-vs-the-real-world
|
|
- https://github.com/pwnwiki/webappurls
|
|
- https://github.com/slxwzk/slxwzkBotnet
|
|
- https://github.com/smartFlash/pySecurity
|
|
- https://github.com/suin-xoops/xoopscube-preloads
|
|
- https://github.com/tardummy01/oscp_scripts-1
|
|
- https://github.com/theGreenJedi/Hacker-Guides
|
|
- https://github.com/theykillmeslowly/CVE-2012-1823
|
|
- https://github.com/zhibx/fscan-Intranet
|
|
- https://github.com/zomasec/CVE-2024-4577
|
|
|