Main
Vulnerability Database
Exploits
ID:1061 - Exploit for OS command injection in PHP - CVE-2012-2311
ID:1061 - Exploit for OS command injection in PHP - CVE-2012-2311
Published: March 18, 2020
Vulnerability identifier: #VU5939
Vulnerability risk: Critical
CVE-ID: CVE-2012-2311
CWE-ID: CWE-78
Exploitation vector: Remote access
Vulnerable software:
PHP
PHP
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to error when parsing QUERY_STRING parameters within PHP-CGI-based application (sapi/cgi/cgi_main.c). A remote attacker can send specially crafted HTTP request with query string, contain a %3D sequence but no = (equals sign) character, inject and execute arbitrary OS commands on vulnerable system with privileges of the web server.
Successful exploitation of the vulnerability results in denial of service or arbitrary code execution on the vulnerable system.
This vulnerability is a result of an incomplete fix for SB2012050301.
Note: the vulnerability was being actively exploited.
The weakness exists due to error when parsing QUERY_STRING parameters within PHP-CGI-based application (sapi/cgi/cgi_main.c). A remote attacker can send specially crafted HTTP request with query string, contain a %3D sequence but no = (equals sign) character, inject and execute arbitrary OS commands on vulnerable system with privileges of the web server.
Successful exploitation of the vulnerability results in denial of service or arbitrary code execution on the vulnerable system.
This vulnerability is a result of an incomplete fix for SB2012050301.
Note: the vulnerability was being actively exploited.
Remediation
Update to version 5.3.13 or 5.4.3 or later.