Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2012-6574 | Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Angstrom Distribution
         Angstrom Distribution narcissus  | 
|
| Vendors & Products | 
        
        Angstrom Distribution
         Angstrom Distribution narcissus  | 
Wed, 06 Aug 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 05 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context. | |
| Title | Narcissus backend.php Image Configuration Command Injection | |
| Weaknesses | CWE-78 | |
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-08-06T15:16:27.531Z
Reserved: 2025-08-05T17:16:18.597Z
Link: CVE-2012-10033
Updated: 2025-08-06T15:14:30.950Z
Status : Awaiting Analysis
Published: 2025-08-05T20:15:34.483
Modified: 2025-08-06T16:15:27.647
Link: CVE-2012-10033
No data.
                        OpenCVE Enrichment
                    Updated: 2025-08-06T15:12:47Z
 EUVD