Описание
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | code not present |
| devel | not-affected | 6.6.3-1 |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/focal | released | 6.0.6-0.1ubuntu0.1~esm1 |
| esm-apps/jammy | released | 6.2.0-2ubuntu0.1~esm1 |
| esm-apps/noble | not-affected | 6.6.3-1 |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | DNE | |
| focal | ignored | end of standard support, was needed |
| groovy | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in ...
PHPMailer untrusted code may be run from an overridden address validator
Уязвимость функции validateAddress библиотеки PHPMailer, позволяющая нарушителю выполнить произвольный код
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3