ID CVE-2006-1014
Summary Argument injection vulnerability in certain PHP 4.x and 5.x applications, when used with sendmail and when accepting remote input for the additional_parameters argument to the mb_send_mail function, allows context-dependent attackers to read and create arbitrary files by providing extra -C and -X arguments to sendmail. NOTE: it could be argued that this is a class of technology-specific vulnerability, instead of a particular instance; if so, then this should not be included in CVE. This vulnerability affects all versions of PHP from 4.0.x through 5.1.x
References
Vulnerable Configurations
  • cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
    cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
CVSS
Base: 3.2 (as of 18-10-2018 - 16:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW SINGLE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:L/AC:L/Au:S/C:P/I:P/A:N
refmap via4
bid 16878
bugtraq 20060228 (PHP) mb_send_mail security bypass
osvdb 23534
secunia
  • 18694
  • 19979
suse SUSE-SA:2006:024
vupen ADV-2006-0772
statements via4
contributor Mark J Cox
lastmodified 2006-08-30
organization Red Hat
statement We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
Last major update 18-10-2018 - 16:30
Published 07-03-2006 - 00:02
Last modified 18-10-2018 - 16:30
Back to Top