Language:
http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/
http://www.php.net/archive/2012.php#id2012-05-08-1
http://www.php.net/ChangeLog-5.php#5.3.13
http://www.php.net/ChangeLog-5.php#5.4.3
Severity: High
ID: 59088
File Name: php_cgi_query_string_code_execution.nasl
Version: 1.21
Type: remote
Family: CGI abuses
Published: 5/14/2012
Updated: 3/28/2022
Supported Sensors: Nessus
Risk Factor: High
Score: 8.9
Risk Factor: High
Base Score: 7.5
Temporal Score: 6.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2012-2311
CPE: cpe:/a:php:php
Required KB Items: www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 5/3/2011
Vulnerability Publication Date: 5/3/2012
CISA Known Exploited Vulnerability Due Dates: 4/15/2022
CANVAS (CANVAS)
Core Impact
Metasploit (PHP CGI Argument Injection)
CVE: CVE-2012-1823, CVE-2012-2311
BID: 53388
CERT: 520827