Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
Metrics
Affected Vendors & Products
References
History
Thu, 07 Aug 2025 07:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Angstrom Distribution
Angstrom Distribution narcissus |
|
Vendors & Products |
Angstrom Distribution
Angstrom Distribution narcissus |
Wed, 06 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 05 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context. | |
Title | Narcissus backend.php Image Configuration Command Injection | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-05T20:03:59.143Z
Updated: 2025-08-06T15:16:27.531Z
Reserved: 2025-08-05T17:16:18.597Z
Link: CVE-2012-10033

Updated: 2025-08-06T15:14:30.950Z

Status : Awaiting Analysis
Published: 2025-08-05T20:15:34.483
Modified: 2025-08-06T16:15:27.647
Link: CVE-2012-10033

No data.