ID EXPLOITPACK:59FCA6AABE180D51E08E9E8A6E2A0282 Type exploitpack Reporter ced.clerget@free.fr Modified 2006-02-28T00:00:00
Description
PHP 4.x5.05.1 - mb_send_mail() Restriction Bypass
source: https://www.securityfocus.com/bid/16878/info
PHP is prone to multiple input-validation vulnerabilities that could allow 'safe_mode' and 'open_basedir' security settings to be bypassed. These issues reside in the 'mb_send_mail()' function, the 'mail()' function, and various PHP IMAP functions.
mb_send_mail($email_address, NULL, NULL, NULL, $additional_param);
{"lastseen": "2020-04-01T19:04:40", "references": [], "description": "\nPHP 4.x5.05.1 - mb_send_mail() Restriction Bypass", "edition": 1, "reporter": "ced.clerget@free.fr", "exploitpack": {"type": "local", "platform": "php"}, "published": "2006-02-28T00:00:00", "title": "PHP 4.x5.05.1 - mb_send_mail() Restriction Bypass", "type": "exploitpack", "enchantments": {"dependencies": {"references": [], "modified": "2020-04-01T19:04:40", "rev": 2}, "score": {"value": 0.1, "vector": "NONE", "modified": "2020-04-01T19:04:40", "rev": 2}, "vulnersScore": 0.1}, "bulletinFamily": "exploit", "cvelist": [], "modified": "2006-02-28T00:00:00", "id": "EXPLOITPACK:59FCA6AABE180D51E08E9E8A6E2A0282", "href": "", "viewCount": 1, "sourceData": "source: https://www.securityfocus.com/bid/16878/info\n \nPHP is prone to multiple input-validation vulnerabilities that could allow 'safe_mode' and 'open_basedir' security settings to be bypassed. These issues reside in the 'mb_send_mail()' function, the 'mail()' function, and various PHP IMAP functions.\n\nmb_send_mail($email_address, NULL, NULL, NULL, $additional_param);", "cvss": {"score": 0.0, "vector": "NONE"}}