https://wiki.atomicorp.com/wiki/index.php?title=WAF_378491&feed=atom&action=historyWAF 378491 - Revision history2024-03-28T16:08:27ZRevision history for this page on the wikiMediaWiki 1.20.2https://wiki.atomicorp.com/wiki/index.php?title=WAF_378491&diff=2440&oldid=prevMshinn at 13:44, 22 June 20122012-06-22T13:44:12Z<p></p>
<table class='diff diff-contentalign-left'>
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;'>
<td colspan='2' style="background-color: white; color:black;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black;">Revision as of 13:44, 22 June 2012</td>
</tr><tr><td colspan="2" class="diff-lineno">Line 15:</td>
<td colspan="2" class="diff-lineno">Line 15:</td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>This rule detects when an attacker attempts to exploit the PHP CGI command injection vulnerability, CVE-2012-1823.  This exploit works when an attacker submits command line arguments to a php application in the URL.  If PGP is running in CGI mode it will allow this, and these command line arguments can be used to perform any action with PHP, including overriding php.ini, injecting code, replace code and other actions.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>This rule detects when an attacker attempts to exploit the PHP CGI command injection vulnerability, CVE-2012-1823.  This exploit works when an attacker submits command line arguments to a php application in the URL.  If PGP is running in CGI mode it will allow this, and these command line arguments can be used to perform any action with PHP, including overriding php.ini, injecting code, replace code and other actions.</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'>−</td><td style="background: #ffa; color:black; font-size: smaller;"><div>This is a critical vulnerability being actively exploited.  <del class="diffchange diffchange-inline">\</del></div></td><td class='diff-marker'>+</td><td style="background: #cfc; color:black; font-size: smaller;"><div>This is a critical vulnerability being actively exploited.   </div></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"></td></tr>
<tr><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>This rule works by detecting the use of a command line switches in the query string.</div></td><td class='diff-marker'> </td><td style="background: #eee; color:black; font-size: smaller;"><div>This rule works by detecting the use of a command line switches in the query string.</div></td></tr>
</table>Mshinnhttps://wiki.atomicorp.com/wiki/index.php?title=WAF_378491&diff=2438&oldid=prevMshinn: Created page with "'''Rule ID''' 378491 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible Attempt to Exploi..."2012-06-22T13:42:44Z<p>Created page with "'''Rule ID''' 378491 '''Status''' Active rule currently published. '''Alert Message''' Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible Attempt to Exploi..."</p>
<p><b>New page</b></p><div>'''Rule ID''' <br />
<br />
378491<br />
<br />
'''Status'''<br />
<br />
Active rule currently published.<br />
<br />
'''Alert Message''' <br />
<br />
Atomicorp.com WAF Rules - Virtual Just In Time Patch: Possible Attempt to Exploit PHP CGI command injection vulnerability<br />
<br />
'''Description''' <br />
<br />
This rule detects when an attacker attempts to exploit the PHP CGI command injection vulnerability, CVE-2012-1823. This exploit works when an attacker submits command line arguments to a php application in the URL. If PGP is running in CGI mode it will allow this, and these command line arguments can be used to perform any action with PHP, including overriding php.ini, injecting code, replace code and other actions.<br />
<br />
This is a critical vulnerability being actively exploited. \<br />
<br />
This rule works by detecting the use of a command line switches in the query string.<br />
<br />
'''False Positives'''<br />
<br />
No known false positives.<br />
<br />
It is not recommended that you disable this rule if you believe you have a false positive. If you believe this is a false positive, please report this to our security team to determine if this is a legitimate case, or if its clever attack on your system. Instructions to report false positives are detailed on the [[Reporting False Positives]] wiki page. If it is a false positive, we will fix the issue in the rules and get a release out to you promptly.<br />
<br />
'''Tuning Guidance'''<br />
<br />
None.<br />
<br />
'''Similar Rules'''<br />
<br />
[[WAF_378371]]<br />
<br />
'''Knowledge Base Articles'''<br />
<br />
None.<br />
<br />
'''Outside References'''<br />
<br />
https://bugs.php.net/bug.php?id=61910<br />
<br />
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823</div>Mshinn