CVE-2018-19518

Published: Nov 25, 2018 Last Modified: Nov 21, 2024
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH 8,5
Access Vector: network
Access Complexity: medium
Authentication: single
Confidentiality: complete
Integrity: complete
Availability: complete

Description

AI Translation Available

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a '-oProxyCommand' argument.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,9396
Percentile
1,0th
Updated

EPSS Score Trend (Last 91 Days)

88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

Draft
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability Other
Potential Impacts:
Execute Unauthorized Code Or Commands Alter Execution Logic Read Application Data Modify Application Data
Applicable Platforms
Languages: Not Language-Specific, PHP
View CWE Details
Exploit

PHP imap_open - Remote Code Execution (Metasploit)

Verified Remote

PHP imap_open - Remote Code Execution (Metasploit)

View Exploit Code →
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Php by Php

Version Range Affected
From 7.0.0 (inclusive)
To 7.0.32 (inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Php by Php

Version Range Affected
From 5.6.0 (inclusive)
To 5.6.38 (inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Php by Php

Version Range Affected
From 7.2.0 (inclusive)
To 7.2.12 (inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Php by Php

Version Range Affected
From 7.1.0 (inclusive)
To 7.1.24 (inclusive)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Ubuntu Linux by Canonical

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Debian Linux by Debian

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Uw-Imap by Uw-Imap Project

cpe:2.3:a:uw-imap_project:uw-imap:2007f:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://antichat.com/threads/463395/#post-4254681
https://bugs.debian.org/913775
Mailing List Third Party Advisory
https://bugs.debian.org/913775
https://bugs.debian.org/913835
Mailing List Third Party Advisory
https://bugs.debian.org/913835
https://bugs.debian.org/913836
Mailing List Third Party Advisory
https://bugs.debian.org/913836
https://bugs.php.net/bug.php?id=76428
Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=76428
https://bugs.php.net/bug.php?id=77153
Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=77153
https://bugs.php.net/bug.php?id=77160
https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17c…
https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html
https://security.gentoo.org/glsa/202003-57
https://security.netapp.com/advisory/ntap-20181221-0004/
https://usn.ubuntu.com/4160-1/
https://www.debian.org/security/2018/dsa-4353
https://www.exploit-db.com/exploits/45914/
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45914/
https://www.openwall.com/lists/oss-security/2018/11/22/3
Exploit Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2018/11/22/3
http://www.securityfocus.com/bid/106018
http://www.securitytracker.com/id/1042157
https://antichat.com/threads/463395/#post-4254681
https://bugs.debian.org/913775
Mailing List Third Party Advisory
https://bugs.debian.org/913775
https://bugs.debian.org/913835
Mailing List Third Party Advisory
https://bugs.debian.org/913835
https://bugs.debian.org/913836
Mailing List Third Party Advisory
https://bugs.debian.org/913836
https://bugs.php.net/bug.php?id=76428
Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=76428
https://bugs.php.net/bug.php?id=77153
Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=77153
https://bugs.php.net/bug.php?id=77160
https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17c…
https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html
https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html
https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html
https://security.gentoo.org/glsa/202003-57
https://security.netapp.com/advisory/ntap-20181221-0004/
https://usn.ubuntu.com/4160-1/
https://www.debian.org/security/2018/dsa-4353
https://www.exploit-db.com/exploits/45914/
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/45914/
https://www.openwall.com/lists/oss-security/2018/11/22/3
Exploit Mailing List Third Party Advisory
https://www.openwall.com/lists/oss-security/2018/11/22/3
http://www.securityfocus.com/bid/106018
http://www.securitytracker.com/id/1042157