Get started for free to scan for vulnerabilites.
Download Mageni to scan for vulnerabilities. It is free to get started and can be installed in Windows, macOS and Linux.
CVE-2012-0831
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://svn.php.net/viewvc?view=revision&revision=323016
- http://www.securityfocus.com/bid/51954
- http://www.ubuntu.com/usn/USN-1358-1
- https://launchpadlibrarian.net/92454212/php5_5.3.2-1ubuntu4.13.diff.gz
- http://secunia.com/advisories/48668
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080037.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080041.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://support.apple.com/kb/HT5501
- http://rhn.redhat.com/errata/RHSA-2013-1307.html
- http://secunia.com/advisories/55078
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73125
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html
Know your vulnerabilities for free. Start using Mageni today.
Mageni can help you to find, assess and manage your vulnerabilities.
Get Started for Free