Lucene search

K
githubGitHub Advisory DatabaseGHSA-V5C9-MMW9-829Q
HistoryMay 14, 2022 - 2:39 a.m.

PHPMailer susceptible to arbitrary code execution

2022-05-1402:39:43
CWE-94
GitHub Advisory Database
github.com
23

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.886 High

EPSS

Percentile

98.7%

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.

CPENameOperatorVersion
phpmailer/phpmailerlt5.2.10

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.886 High

EPSS

Percentile

98.7%