University of Washington IMAP Toolkit 2007f on UNIX, as used in imapopen() in PHP and other products, launches an rsh command (by means of the imaprimap function in c-client/imap4r1.c and the tcpaopen function in osdep/unix/tcpunix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
{
"versions": [
{
"introduced": "5.6.0"
},
{
"last_affected": "5.6.38"
},
{
"introduced": "7.0.0"
},
{
"last_affected": "7.0.32"
},
{
"introduced": "7.1.0"
},
{
"last_affected": "7.1.24"
},
{
"introduced": "7.2.0"
},
{
"last_affected": "7.2.12"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19.04"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19518.json"