Language:
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
https://bugs.php.net/bug.php?id=61910
http://www.php.net/archive/2012.php#id2012-05-03-1
Severity: High
ID: 58988
File Name: php_5_4_2.nasl
Version: 1.27
Type: remote
Family: CGI abuses
Published: 5/4/2012
Updated: 5/31/2024
Configuration: Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Critical
Score: 9.0
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2012-1823
CPE: cpe:/a:php:php
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 5/3/2012
Vulnerability Publication Date: 5/3/2012
CISA Known Exploited Vulnerability Due Dates: 4/15/2022
CANVAS (CANVAS)
Core Impact
Metasploit (PHP CGI Argument Injection)
CVE: CVE-2012-1823
BID: 53388
CERT: 520827