Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-36326

Опубликовано: 28 апр. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

6.6.3-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

6.2.0-2
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

DNE

focal

not-affected

code not present
groovy

ignored

end of life
hirsute

ignored

end of life

Показывать по

EPSS

Процентиль: 76%
0.0099
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS3: 9.8
debian
около 4 лет назад

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Des ...

CVSS3: 9.8
github
около 4 лет назад

Object injection in PHPMailer/PHPMailer

EPSS

Процентиль: 76%
0.0099
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3