Files
CVEs-PoC/2012/CVE-2012-10033.md
T
2025-09-29 21:09:30 +02:00

20 lines
1.2 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2012-10033](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10033)
![](https://img.shields.io/static/v1?label=Product&message=Narcissus&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20('OS%20Command%20Injection')&color=brightgreen)
### Description
Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHPs passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web servers context.
### POC
#### Reference
- https://www.exploit-db.com/exploits/22709
- https://www.exploit-db.com/exploits/22856
- https://www.vulncheck.com/advisories/narcissus-image-config-command-injection
#### Github
No PoCs found on GitHub currently.