Source Code Exposure (CVE-2012-1823)

By
Anandhu Krishnan
Published on
13 May 2024
Vulnerability

Description

A vulnerability in PHP, when configured to run using CGI, allows an attacker to disclose the source code of PHP files and potentially execute arbitrary code. This occurs when a query string lacks an unescaped ‘=’ character, causing PHP to output the file contents directly.

Recommendation

Upgrade to the latest stable version of PHP or use Apache’s mod_rewrite module with RewriteCond and RewriteRule directives to filter out malicious requests.

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Anandhu Krishnan
Anandhu Krishnan
Lead Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment