PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
References
Link | Resource |
---|---|
http://online.securityfocus.com/archive/1/194425 | Broken Link Third Party Advisory VDB Entry |
http://www.iss.net/security_center/static/6787.php | Broken Link Patch Vendor Advisory |
http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz | Broken Link |
http://www.redhat.com/support/errata/RHSA-2002-102.html | Broken Link |
http://www.redhat.com/support/errata/RHSA-2002-129.html | Broken Link |
http://www.redhat.com/support/errata/RHSA-2003-159.html | Broken Link |
http://www.securityfocus.com/bid/2954 | Broken Link Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2001-06-30 04:00
Updated : 2024-02-14 15:17
NVD link : CVE-2001-1246
Mitre link : CVE-2001-1246
CVE.ORG link : CVE-2001-1246
JSON object : View
Products Affected
php
- php
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')