Source Code Disclosure - CVE-2012-1823
ID |
source_code_disclosure_cve_2012_1823 |
Severity |
critical |
Kind |
Information Disclosure |
CWE |
20 |
Description
Some PHP versions, when configured to run using CGI, do not correctly handle query strings that lack an unescaped "=" character, enabling PHP source code disclosure, and arbitrary code execution. In this case, the contents of the PHP file were served directly to the web browser. This output will typically contain PHP, although it may also contain straight HTML.
Rationale
This vulnerability allows attackers to bypass PHP execution and retrieve raw source code by crafting malicious query strings. Exposed source code can reveal sensitive information such as database credentials, API keys, encryption secrets, and business logic. Furthermore, the same vulnerability can be exploited to achieve arbitrary code execution, allowing attackers to completely compromise the web server and potentially pivot to internal systems.