BIT-phpmailer-2021-3603

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/phpmailer/BIT-phpmailer-2021-3603.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-phpmailer-2021-3603
Aliases
Published
2024-03-06T11:01:27.687Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

Database specific
{
    "cpes": [
        "cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / phpmailer

Package

Name
phpmailer
Purl
pkg:bitnami/phpmailer

Severity

  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.4.1