CVE-2017-5223

EUVD-2020-0329
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 92%
Affected Products (NVD)
VendorProductVersion
phpmailer_projectphpmailer
𝑥
≤ 5.2.21
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libphp-phpmailer
bookworm
6.6.3-1
fixed
bullseye
6.2.0-2
fixed
sid
6.9.1-1
fixed
trixie
6.9.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libphp-phpmailer
artful
ignored
bionic
not-affected
cosmic
not-affected
disco
not-affected
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
precise
ignored
trusty
dne
xenial
Fixed 5.2.14+dfsg-1ubuntu0.1~esm1
released
yakkety
ignored
zesty
ignored