Lucene search

K
githubGitHub Advisory DatabaseGHSA-8JC3-5P29-QGJX
HistoryFeb 02, 2024 - 8:43 p.m.

PHPMailer Local file inclusion

2024-02-0220:43:57
GitHub Advisory Database
github.com
16
arbitrary local file inclusion
phpmailer
cve-2006-5734
cve-2007-3215
cve-2007-2021
remote exploit
phpmailer 5.2.0
filter user data
validate data.

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.3 Medium

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.2%

Impact

Arbitrary local file inclusion via the $lang property, remotely exploitable if host application passes unfiltered user data into that property. The 3 CVEs listed are applications that used PHPMailer that were vulnerable to this problem.

Patches

It’s not known exactly when this was fixed in the host applications, but it was fixed in PHPMailer 5.2.0.

Workarounds

Filter and validate user-supplied data before use.

References

https://nvd.nist.gov/vuln/detail/CVE-2006-5734
https://nvd.nist.gov/vuln/detail/CVE-2007-3215
https://nvd.nist.gov/vuln/detail/CVE-2007-2021
Example exploit: https://www.exploit-db.com/exploits/14893

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
phpmailerphpmailerRange<5.2.0
CPENameOperatorVersion
phpmailer/phpmailerlt5.2.0

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

6.3 Medium

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.2%