First published: Fri May 11 2012(Updated: )
Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577)
Credit: cret@cert.org cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | ||
PHP | <=5.3.11 | |
PHP | =5.0.0 | |
PHP | =5.0.0-beta1 | |
PHP | =5.0.0-beta2 | |
PHP | =5.0.0-beta3 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0-rc1 | |
PHP | =5.0.0-rc2 | |
PHP | =5.0.0-rc3 | |
PHP | =5.0.1 | |
PHP | =5.0.2 | |
PHP | =5.0.3 | |
PHP | =5.0.4 | |
PHP | =5.0.5 | |
PHP | =5.1.0 | |
PHP | =5.1.1 | |
PHP | =5.1.2 | |
PHP | =5.1.3 | |
PHP | =5.1.4 | |
PHP | =5.1.5 | |
PHP | =5.1.6 | |
PHP | =5.2.0 | |
PHP | =5.2.1 | |
PHP | =5.2.2 | |
PHP | =5.2.3 | |
PHP | =5.2.4 | |
PHP | =5.2.5 | |
PHP | =5.2.6 | |
PHP | =5.2.7 | |
PHP | =5.2.8 | |
PHP | =5.2.9 | |
PHP | =5.2.10 | |
PHP | =5.2.11 | |
PHP | =5.2.12 | |
PHP | =5.2.13 | |
PHP | =5.2.14 | |
PHP | =5.2.15 | |
PHP | =5.2.16 | |
PHP | =5.2.17 | |
PHP | =5.3.0 | |
PHP | =5.3.1 | |
PHP | =5.3.2 | |
PHP | =5.3.3 | |
PHP | =5.3.4 | |
PHP | =5.3.5 | |
PHP | =5.3.6 | |
PHP | =5.3.7 | |
PHP | =5.3.8 | |
PHP | =5.3.9 | |
PHP | =5.3.10 | |
PHP | =5.4.0 | |
PHP | =5.4.1 | |
PHP | <8.3.8 | 8.3.8 |
PHP | <8.1.29 | 8.1.29 |
PHP | <5.3.12 | |
PHP | >=5.4.0<5.4.2 | |
Fedora | =39 | |
Fedora | =40 | |
Debian | =6.0 | |
HPE HP-UX | =b.11.23 | |
HPE HP-UX | =b.11.31 | |
openSUSE | =11.4 | |
openSUSE | =12.1 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
suse linux enterprise server vmware | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp4 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
Apple iOS and macOS | >=10.6.8<10.7.5 | |
Apple iOS and macOS | >=10.8.0<10.8.2 | |
Red Hat Application Stack | =2.0 | |
Red Hat Gluster Storage Server | =2.0 | |
Red Hat Storage | =2.0 | |
redhat Storage for public cloud | =2.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.6 | |
redhat enterprise Linux eus | =6.1 | |
redhat enterprise Linux eus | =6.2 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =5.3 | |
redhat enterprise Linux server aus | =5.6 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 |
https://bugs.php.net/patch-display.php?bug_id=61910&patch=cgi.diff&revision=1335984315&display=1
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1823 is considered a medium severity vulnerability due to its potential to allow argument injection in PHP-CGI.
To fix CVE-2012-1823, upgrade PHP to version 5.3.12 or later, or 5.4.2 or later.
CVE-2012-1823 affects PHP versions 5.3.11 and earlier, as well as 5.4.1 and earlier.
CVE-2012-1823 impacts PHP CGI configurations by allowing an attacker to bypass security measures through malformed query strings.
CVE-2012-1823 has been linked to CVE-2024-4577, which addresses a bypass of the original issue.