CVE-2018-19518
25.11.2018, 10:29
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
Vendor | Product | Version |
---|---|---|
php | php | 5.6.0 ≤ 𝑥 ≤ 5.6.38 |
php | php | 7.0.0 ≤ 𝑥 ≤ 7.0.32 |
php | php | 7.1.0 ≤ 𝑥 ≤ 7.1.24 |
php | php | 7.2.0 ≤ 𝑥 ≤ 7.2.12 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.04 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
php-imap |
| ||||||||||||||||||||||
php5 |
| ||||||||||||||||||||||
php7.0 |
| ||||||||||||||||||||||
php7.2 |
| ||||||||||||||||||||||
php7.3 |
| ||||||||||||||||||||||
uw-imap |
|
References