CVE-2012-10033 – Narcissus PHP Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2012-10033 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 05, 2025

    Action Type Old Value New Value
    Added Tag unsupported-when-assigned
    Added Description Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-78
    Added Reference https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/narcissus_backend_exec.rb
    Added Reference https://web.archive.org/web/20101127002623/https://narcissus.angstrom-distribution.org/
    Added Reference https://www.exploit-db.com/exploits/22709
    Added Reference https://www.exploit-db.com/exploits/22856
    Added Reference https://www.vulncheck.com/advisories/narcissus-image-config-command-injection
Share the Post:

Related Posts