5
CVSSv2

CVE-2002-0986

Published: 24/09/2002 Updated: 10/10/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mail function in PHP 4.x to 4.2.2 does not filter ASCII control characters from its arguments, which could allow remote malicious users to modify mail message content, including mail headers, and possibly use PHP as a "spam proxy."

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.3

php php 4.2.0

php php 4.2.1

php php 4.0.1

php php 4.0.2

php php 4.1.1

php php 4.1.2

php php 3.0.18

php php 4.0

php php 4.0.4

php php 4.0.5

php php 4.0.6

php php 4.2.2

php php 4.0.7

php php 4.1.0

Vendor Advisories

Wojciech Purczynski found out that it is possible for scripts to pass arbitrary text to sendmail as commandline extension when sending a mail through PHP even when safe_mode is turned on Passing 5th argument should be disabled if PHP is configured in safe_mode, which is the case for newer PHP versions and for the versions below This does not affe ...