Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
History

Thu, 07 Aug 2025 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Angstrom Distribution
Angstrom Distribution narcissus
Vendors & Products Angstrom Distribution
Angstrom Distribution narcissus

Wed, 06 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 05 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Description Narcissus is vulnerable to remote code execution via improper input handling in its image configuration workflow. Specifically, the backend.php script fails to sanitize the release parameter before passing it to the configure_image() function. This function invokes PHP’s passthru() with the unsanitized input, allowing attackers to inject arbitrary system commands. Exploitation occurs via a crafted POST request, resulting in command execution under the web server’s context.
Title Narcissus backend.php Image Configuration Command Injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-05T20:03:59.143Z

Updated: 2025-08-06T15:16:27.531Z

Reserved: 2025-08-05T17:16:18.597Z

Link: CVE-2012-10033

cve-icon Vulnrichment

Updated: 2025-08-06T15:14:30.950Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-05T20:15:34.483

Modified: 2025-08-06T16:15:27.647

Link: CVE-2012-10033

cve-icon Redhat

No data.