Rapid7 Vulnerability & Exploit Database

PHP mail() Safemode Bypass Vulnerability

Back to Search

PHP mail() Safemode Bypass Vulnerability

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
06/30/2001
Created
07/25/2018
Added
11/01/2004
Modified
08/22/2013

Description

PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.

Solution(s)

  • php-upgrade-4_2_3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;