Jump to content
Kwelwild

Metasploit Exploiting Cve-2012-1823

Recommended Posts

Posted



Description: In this video i will show you how to exploit PHP-CGI Vulnerability (CVE-2012-1823 ) using Metasploit Framework.
Vulnerable ISO : - https://www.pentesterlab.com/cve-2012-1823/cve-2012-1823.iso
This exercise explains how you can exploit CVE-2012-1823 to retrieve the source code of an application and gain code execution.
PDF : - https://www.pentesterlab.com/cve-2012-1823/cve-2012-1823.pdf

The bug

The bug is due to an error on how the URI is used and provided to PHP CGI when a URL lacks = sign (typically used to separate parameter's name and value. Basically, the URI is passed to the php-cgi binary without enough filtering or encoding allowing an attacker to pass extra-argument to php-cgi command line.

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Metasploit Exploiting Cve-2012-1823

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...