Exploited
CWE
20 77
Advisory Published
Updated

CVE-2012-1823: PHP-CGI Query String Parameter Vulnerability

First published: Fri May 11 2012(Updated: )

Fixed bug GHSA-3qgc-jrrr-25jv (Bypass of CVE-2012-1823, Argument Injection in PHP-CGI). (CVE-2024-4577)

Credit: cret@cert.org cret@cert.org

Affected SoftwareAffected VersionHow to fix
PHP
PHP<=5.3.11
PHP=5.0.0
PHP=5.0.0-beta1
PHP=5.0.0-beta2
PHP=5.0.0-beta3
PHP=5.0.0-beta4
PHP=5.0.0-rc1
PHP=5.0.0-rc2
PHP=5.0.0-rc3
PHP=5.0.1
PHP=5.0.2
PHP=5.0.3
PHP=5.0.4
PHP=5.0.5
PHP=5.1.0
PHP=5.1.1
PHP=5.1.2
PHP=5.1.3
PHP=5.1.4
PHP=5.1.5
PHP=5.1.6
PHP=5.2.0
PHP=5.2.1
PHP=5.2.2
PHP=5.2.3
PHP=5.2.4
PHP=5.2.5
PHP=5.2.6
PHP=5.2.7
PHP=5.2.8
PHP=5.2.9
PHP=5.2.10
PHP=5.2.11
PHP=5.2.12
PHP=5.2.13
PHP=5.2.14
PHP=5.2.15
PHP=5.2.16
PHP=5.2.17
PHP=5.3.0
PHP=5.3.1
PHP=5.3.2
PHP=5.3.3
PHP=5.3.4
PHP=5.3.5
PHP=5.3.6
PHP=5.3.7
PHP=5.3.8
PHP=5.3.9
PHP=5.3.10
PHP=5.4.0
PHP=5.4.1
PHP<8.3.8
8.3.8
PHP<8.1.29
8.1.29
PHP<5.3.12
PHP>=5.4.0<5.4.2
Fedora=39
Fedora=40
Debian=6.0
HPE HP-UX=b.11.23
HPE HP-UX=b.11.31
openSUSE=11.4
openSUSE=12.1
SUSE Linux Enterprise Server=10-sp4
SUSE Linux Enterprise Server=11-sp2
suse linux enterprise server vmware=11-sp2
SUSE Linux Enterprise Software Development Kit=10-sp4
SUSE Linux Enterprise Software Development Kit=11-sp2
Apple iOS and macOS>=10.6.8<10.7.5
Apple iOS and macOS>=10.8.0<10.8.2
Red Hat Application Stack=2.0
Red Hat Gluster Storage Server=2.0
Red Hat Storage=2.0
redhat Storage for public cloud=2.0
redhat enterprise Linux desktop=6.0
redhat enterprise Linux eus=5.6
redhat enterprise Linux eus=6.1
redhat enterprise Linux eus=6.2
redhat enterprise Linux server=5.0
redhat enterprise Linux server=6.0
redhat enterprise Linux server aus=5.3
redhat enterprise Linux server aus=5.6
redhat enterprise Linux workstation=5.0
redhat enterprise Linux workstation=6.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2012-1823?

    CVE-2012-1823 is considered a medium severity vulnerability due to its potential to allow argument injection in PHP-CGI.

  • How do I fix CVE-2012-1823?

    To fix CVE-2012-1823, upgrade PHP to version 5.3.12 or later, or 5.4.2 or later.

  • What versions of PHP are affected by CVE-2012-1823?

    CVE-2012-1823 affects PHP versions 5.3.11 and earlier, as well as 5.4.1 and earlier.

  • How does CVE-2012-1823 impact PHP CGI configurations?

    CVE-2012-1823 impacts PHP CGI configurations by allowing an attacker to bypass security measures through malformed query strings.

  • Is CVE-2012-1823 related to any other vulnerabilities?

    CVE-2012-1823 has been linked to CVE-2024-4577, which addresses a bypass of the original issue.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203