Lucene search

K
ubuntucveUbuntu.comUB:CVE-2021-3603
HistoryJun 17, 2021 - 12:00 a.m.

CVE-2021-3603

2021-06-1700:00:00
ubuntu.com
ubuntu.com
17

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

71.3%

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in
untrusted code being called (if such code is injected into the host
project’s scope by other means). If the $patternselect parameter to
validateAddress() is set to ‘php’ (the default, defined by
PHPMailer::$validator), and the global namespace contains a function called
php, it will be called in preference to the built-in validator of the same
name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as
validator function names.

Notes

Author Note
ccdm94 the vulnerable code section seems to have been introduced by commit 77c0bc8d (v.5.2.15). For this reason, bionic and earlier are not vulnerable.
OSVersionArchitecturePackageVersionFilename
ubuntu20.04noarchlibphp-phpmailer< 6.0.6-0.1ubuntu0.1~esm1UNKNOWN
ubuntu22.04noarchlibphp-phpmailer< 6.2.0-2ubuntu0.1~esm1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

71.3%