Vulnerability Details : CVE-2012-0831
Potential exploit
PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.
Vulnerability category: Sql InjectionInput validation
Products affected by CVE-2012-0831
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Threat overview for CVE-2012-0831
Top countries where our scanners detected CVE-2012-0831
Top open port discovered on systems with this issue
80
IPs affected by CVE-2012-0831 43,453
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-0831!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-0831
16.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-0831
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-0831
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0831
-
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
http://svn.php.net/viewvc?view=revision&revision=323016
PHP: Revision 323016Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
[security-announce] openSUSE-SU-2012:0426-1: important: update for php5Mailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080037.html
[SECURITY] Fedora 15 Update: php-5.3.11-1.fc15Mailing List;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/73125
PHP magic_quotes_gpc security bypass CVE-2012-0831 Vulnerability ReportThird Party Advisory;VDB Entry
-
https://launchpadlibrarian.net/92454212/php5_5.3.2-1ubuntu4.13.diff.gz
Exploit;Third Party Advisory
-
http://rhn.redhat.com/errata/RHSA-2013-1307.html
RHSA-2013:1307 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
[security-announce] SUSE-SU-2012:0411-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html
[security-announce] SUSE-SU-2012:0472-1: important: Security update forMailing List;Third Party Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080041.html
[SECURITY] Fedora 16 Update: php-5.3.11-1.fc16Mailing List;Third Party Advisory
-
http://support.apple.com/kb/HT5501
About the security content of OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 - Apple SupportThird Party Advisory
-
http://www.securityfocus.com/bid/51954
PHP CVE-2012-0831 'magic_quotes_gpc' Directive Security Bypass WeaknessPatch;Third Party Advisory;VDB Entry
-
http://www.ubuntu.com/usn/USN-1358-1
USN-1358-1: PHP vulnerabilities | Ubuntu security noticesPatch;Third Party Advisory
Jump to