10
CVSSv2

CVE-2008-5619

Published: 17/12/2008 Updated: 11/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer prior to 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote malicious users to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

Vulnerable Product Search on Vulmon Subscribe to Product

roundcube webmail 0.2.1

roundcube webmail 0.2.3

Vendor Advisories

Thor Larholm discovered that PHPMailer, as used by Moodle, did not correctly escape email addresses A local attacker with direct access to the Moodle database could exploit this to execute arbitrary commands as the web server user (CVE-2007-3215) ...

Exploits

#!/bin/sh # # I was hoping the PoC would not appear so soon, # but now that it is out, # i thought i might as well publish my real exploit # # Hunger # # # cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2008-5619 # # FOR LEARNING PURPOSES ONLY! # # PHP> echo(ini_get('disable_functions')); # # exec, system # # PHP> passthru("id; uname -a") ...
Public Release Date of POC: 2008-12-22 Author: Jacobo Avariento Gimeno (Sofistic) CVE id: CVE-2008-5619 Bugtraq id: 32799 Severity: Critical Vulnerability reported by: RealMurphy Intro ---- Roundcube Webmail is a browser-based IMAP client that uses "chuggnuttcom HTML to Plain Text Conversion" library to convert HTML text to plain text, this libr ...
RoundCube Webmail versions 02b and below remote code execution exploit ...
RoundCube Webmail versions 02-3 Beta and below suffer from a remote code execution vulnerability ...