University of Washington IMAP Toolkit 2007f on UNIX, as used in imapopen() in PHP and other products, launches an rsh command (by means of the imaprimap function in c-client/imap4r1.c and the tcpaopen function in osdep/unix/tcpunix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
{
"unresolved_ranges": [
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"extracted_events": [
{
"last_affected": "16.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "19.04"
}
],
"source": "CPE_FIELD"
},
{
"cpe": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "9.0"
}
],
"source": "CPE_FIELD"
}
]
}{
"cpe": [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "5.6.0"
},
{
"last_affected": "5.6.38"
},
{
"introduced": "7.0.0"
},
{
"last_affected": "7.0.32"
},
{
"introduced": "7.1.0"
},
{
"last_affected": "7.1.24"
},
{
"introduced": "7.2.0"
},
{
"last_affected": "7.2.12"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
],
"source": "CPE_FIELD"
}{
"cpe": "cpe:2.3:a:uw-imap_project:uw-imap:2007f:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "2007f"
}
],
"source": "CPE_FIELD"
}