3.2
CVSSv2

CVE-2006-1014

Published: 07/03/2006 Updated: 18/10/2018
CVSS v2 Base Score: 3.2 | Impact Score: 4.9 | Exploitability Score: 3.1
VMScore: 325
Vector: AV:L/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent malicious users to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.2

php php 4.3.11

php php 4.3.3

php php 4.4.0

php php 4.4.1

php php 5.0.0

php php 5.0.1

php php 5.0

php php 5.1.0

php php 4.0.0

php php 4.3.6

php php 4.3.7

php php 5.0.4

php php 5.0.5

php php 4.3.4

php php 4.3.5

php php 5.0.2

php php 5.0.3

php php 4.3.10

php php 4.3.8

php php 4.3.9

Vendor Advisories

Debian Bug report logs - #368592 php4: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function Package: php4; Maintainer for php4 is (unknown); Reported by: Alec Berryman <alec@thenednet> Date: Tue, 23 May 2006 11:48:09 UTC Severity: important Tags: security Done: sean finney <seanius@seaniusnet ...

Exploits

source: wwwsecurityfocuscom/bid/16878/info PHP is prone to multiple input-validation vulnerabilities that could allow 'safe_mode' and 'open_basedir' security settings to be bypassed These issues reside in the 'mb_send_mail()' function, the 'mail()' function, and various PHP IMAP functions mb_send_mail($email_address, NULL, NULL, NULL, ...