Description
PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1277 | PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names. |
Github GHSA |
GHSA-77mr-wc79-m8j3 | PHPMailer untrusted code may be run from an overridden address validator |
Ubuntu USN |
USN-5956-1 | PHPMailer vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: @huntrdev
Published:
Updated: 2024-08-03T17:01:07.074Z
Reserved: 2021-06-15T00:00:00.000Z
Link: CVE-2021-3603
No data.
Status : Modified
Published: 2021-06-17T12:15:08.150
Modified: 2024-11-21T06:21:57.330
Link: CVE-2021-3603
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN