6.4
CVSSv2

CVE-2006-1015

Published: 07/03/2006 Updated: 30/10/2018
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 645
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

Argument injection vulnerability in certain PHP 3.x, 4.x, and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mail function, allows remote malicious users to read and create arbitrary files via the sendmail -C and -X arguments. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 3.0.13

php php 3.0.14

php php 3.0.4

php php 3.0.5

php php 3.0.6

php php 4.0.1

php php 4.0.2

php php 4.0.7

php php 4.2.3

php php 4.2

php php 4.3.4

php php 4.3.5

php php 4.4.2

php php 5.0.0

php php 5.0.1

php php 5.0.2

php php 5.1.0

php php 5.1.1

php php 3.0.1

php php 3.0.10

php php 3.0.17

php php 3.0.18

php php 3.0.9

php php 4.0.0

php php 4.0.4

php php 4.0.5

php php 4.1.1

php php 4.1.2

php php 4.3.10

php php 4.3.11

php php 4.3.8

php php 4.3.9

php php 5.0.5

php php 5.0

php php 3.0

php php 3.0.15

php php 3.0.16

php php 3.0.7

php php 3.0.8

php php 4.0.3

php php 4.1.0

php php 4.3.0

php php 4.3.1

php php 4.3.6

php php 4.3.7

php php 5.0.3

php php 5.0.4

php php 5.1.2

php php 3.0.11

php php 3.0.12

php php 3.0.2

php php 3.0.3

php php 4.0.6

php php 4.2.0

php php 4.2.1

php php 4.2.2

php php 4.3.2

php php 4.3.3

php php 4.4.0

php php 4.4.1

Vendor Advisories

Debian Bug report logs - #368592 php4: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function Package: php4; Maintainer for php4 is (unknown); Reported by: Alec Berryman <alec@thenednet> Date: Tue, 23 May 2006 11:48:09 UTC Severity: important Tags: security Done: sean finney <seanius@seaniusnet ...

Exploits

source: wwwsecurityfocuscom/bid/16878/info PHP is prone to multiple input-validation vulnerabilities that could allow 'safe_mode' and 'open_basedir' security settings to be bypassed These issues reside in the 'mb_send_mail()' function, the 'mail()' function, and various PHP IMAP functions $additional_param = "-C "$file_to_read" -X " ...