Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04amMzLTVwMjktcWdqeM4AA5CY
PHPMailer Local file inclusion
Impact
Arbitrary local file inclusion via the $lang
property, remotely exploitable if host application passes unfiltered user data into that property. The 3 CVEs listed are applications that used PHPMailer that were vulnerable to this problem.
Patches
It's not known exactly when this was fixed in the host applications, but it was fixed in PHPMailer 5.2.0.
Workarounds
Filter and validate user-supplied data before use.
References
https://nvd.nist.gov/vuln/detail/CVE-2006-5734
https://nvd.nist.gov/vuln/detail/CVE-2007-3215
https://nvd.nist.gov/vuln/detail/CVE-2007-2021
Example exploit: https://www.exploit-db.com/exploits/14893
For more information
If you have any questions or comments about this advisory:
- Open a private issue in the PHPMailer project
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04amMzLTVwMjktcWdqeM4AA5CY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 10 months ago
Updated: 10 months ago
Identifiers: GHSA-8jc3-5p29-qgjx, CVE-2006-5734
References:
- https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-8jc3-5p29-qgjx
- https://github.com/advisories/GHSA-8jc3-5p29-qgjx
Blast Radius: 0.0
Affected Packages
packagist:phpmailer/phpmailer
Dependent packages: 1,306Dependent repositories: 19,318
Downloads: 70,062,547 total
Affected Version Ranges: < 5.2.0
Fixed in: 5.2.0
All affected versions:
All unaffected versions: 5.2.2, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8, 5.2.9, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.2.16, 5.2.17, 5.2.18, 5.2.19, 5.2.20, 5.2.21, 5.2.22, 5.2.23, 5.2.24, 5.2.25, 5.2.26, 5.2.27, 5.2.28, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.1.0, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.2.0, 6.3.0, 6.4.0, 6.4.1, 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.5.4, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.7.1, 6.8.0, 6.8.1, 6.9.0, 6.9.1, 6.9.2