Total vulnerabilities in the database
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
Software | From | Fixed in |
---|---|---|
php / php | 5.6.0 | 5.6.38.x |
php / php | 7.2.0 | 7.2.12.x |
php / php | 7.1.0 | 7.1.24.x |
php / php | 7.0.0 | 7.0.32.x |
debian / debian_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |
uw-imap_project / uw-imap | 2007f | 2007f.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 19.04 | 19.04.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |