CVE-2012-10033

Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
CVSS

No CVSS.

Configurations

No configuration.

History

06 Aug 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) Narcissus es vulnerable a la ejecución remota de código debido a un manejo incorrecto de la entrada en su flujo de trabajo de configuración de imágenes. En concreto, el script backend.php no depura el parámetro release antes de pasarlo a la función configure_image(). Esta función invoca la función passthru() de PHP con la entrada no depurada, lo que permite a los atacantes inyectar comandos arbitrarios del sistema. La explotación se produce mediante una solicitud POST manipulada, lo que provoca la ejecución del comando en el contexto del servidor web.
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/narcissus_backend_exec.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/narcissus_backend_exec.rb -
References () https://www.exploit-db.com/exploits/22709 - () https://www.exploit-db.com/exploits/22709 -
References () https://www.exploit-db.com/exploits/22856 - () https://www.exploit-db.com/exploits/22856 -

05 Aug 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-05 20:15

Updated : 2025-08-06 16:15


NVD link : CVE-2012-10033

Mitre link : CVE-2012-10033

CVE.ORG link : CVE-2012-10033


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')