668
VMScore

CVE-2020-36326

Published: 28/04/2021 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHPMailer 6.1.8 up to and including 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

phpmailer project phpmailer

wordpress wordpress

Vendor Advisories

Debian Bug report logs - #988732 CVE-2020-36326 Package: libphp-phpmailer; Maintainer for libphp-phpmailer is Debian PHP PEAR Maintainers <pkg-php-pear@listsaliothdebianorg>; Source for libphp-phpmailer is src:libphp-phpmailer (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 18 May ...

Github Repositories

Trivy example module for WordPress

Trivy WoredPress Module This module provides a more in-depth investigation of Wordpress detection Set up $ tinygo build -o wordpresswasm -scheduler=none -target=wasi --no-debug wordpressgo $ mkdir -p ~/trivy/modules $ cp wordpresswasm ~/trivy/modules It is also available in GHCR You can install it via trivy module install $ trivy