University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1608-1 | php5 security update |
Debian DLA |
DLA-1700-1 | uw-imap security update |
Debian DLA |
DLA-2866-1 | uw-imap security update |
Debian DSA |
DSA-4353-1 | php7.0 security update |
Ubuntu USN |
USN-4160-1 | UW IMAP vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T11:37:11.529Z
Reserved: 2018-11-25T00:00:00
Link: CVE-2018-19518
No data.
Status : Modified
Published: 2018-11-25T10:29:00.250
Modified: 2024-11-21T03:58:04.993
Link: CVE-2018-19518
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN