Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2012-0831
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 6.8/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://svn.php.net/viewvc?view=revision&revision=323016
- http://www.securityfocus.com/bid/51954
- http://www.ubuntu.com/usn/USN-1358-1
- https://launchpadlibrarian.net/92454212/php5_5.3.2-1ubuntu4.13.diff.gz
- http://secunia.com/advisories/48668
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00016.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080037.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080041.html
- http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- http://support.apple.com/kb/HT5501
- http://rhn.redhat.com/errata/RHSA-2013-1307.html
- http://secunia.com/advisories/55078
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73125
- http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00001.html