Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 616
  • Last Modified:

PHP php-cgi Query String Parameter Parsing Exploit Attempt

I currently have a Web/FTP server that is running Windows 2008R2 standard that is getting monitored for ISP traffic and currently they are seeing

'50744 VID43969 PHP php-cgi Query String Parameter Parsing Exploit Attempt Inbound (CVE-2012-1823)' they are saying that one or more external hosts are attempting to discover whether one of your Internet-facing devices is vulnerable to either the PHP-CGI argument injection (CVE-2012-1823) or the PHP-CGI improper handling of query strings (CVE-2012-2311) vulnerabilities. Successful exploitation of these vulnerabilities may result in information disclosure or remote code execution.
I am not sure what this means and how to protect the system.
0
ahmad1467
Asked:
ahmad1467
1 Solution
 
Ray PaseurCommented:
These vulnerabilties are quite old.  Some background, so you can make your own tests:
http://www.cvedetails.com/cve/CVE-2012-1823
http://www.cvedetails.com/cve/CVE-2012-2311

At current levels of PHP there appears to be little risk:
http://www.cvedetails.com/vulnerability-list/vendor_id-74/product_id-128/version_id-125891/PHP-PHP-5.4.2.html
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now