PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2003-159.html | vendor advisory broken link |
http://www.redhat.com/support/errata/RHSA-2002-129.html | vendor advisory broken link |
http://www.iss.net/security_center/static/6787.php | vdb entry broken link patch vendor advisory |
http://www.securityfocus.com/bid/2954 | vdb entry third party advisory broken link |
http://online.securityfocus.com/archive/1/194425 | mailing list vdb entry third party advisory broken link |
http://www.redhat.com/support/errata/RHSA-2002-102.html | vendor advisory broken link |
http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz | broken link |