CVE-2008-5619

html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.
References
Link Resource
http://mahara.org/interaction/forum/topic.php?id=533
http://osvdb.org/53893
http://secunia.com/advisories/33145
http://secunia.com/advisories/33170 Vendor Advisory
http://secunia.com/advisories/34789
http://sourceforge.net/forum/forum.php?forum_id=898542 Vendor Advisory
http://trac.roundcube.net/changeset/2148 Exploit
http://trac.roundcube.net/ticket/1485618 Exploit
http://www.openwall.com/lists/oss-security/2008/12/12/1
http://www.securityfocus.com/archive/1/499489/100/0/threaded
http://www.vupen.com/english/advisories/2008/3418
http://www.vupen.com/english/advisories/2008/3419
https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a
https://www.exploit-db.com/exploits/7549
https://www.exploit-db.com/exploits/7553
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html
http://mahara.org/interaction/forum/topic.php?id=533
http://osvdb.org/53893
http://secunia.com/advisories/33145
http://secunia.com/advisories/33170 Vendor Advisory
http://secunia.com/advisories/34789
http://sourceforge.net/forum/forum.php?forum_id=898542 Vendor Advisory
http://trac.roundcube.net/changeset/2148 Exploit
http://trac.roundcube.net/ticket/1485618 Exploit
http://www.openwall.com/lists/oss-security/2008/12/12/1
http://www.securityfocus.com/archive/1/499489/100/0/threaded
http://www.vupen.com/english/advisories/2008/3418
http://www.vupen.com/english/advisories/2008/3419
https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a
https://www.exploit-db.com/exploits/7549
https://www.exploit-db.com/exploits/7553
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:roundcube:webmail:0.2.1:alpha:*:*:*:*:*:*
cpe:2.3:a:roundcube:webmail:0.2.3:beta:*:*:*:*:*:*

History

21 Nov 2024, 00:54

Type Values Removed Values Added
References () http://mahara.org/interaction/forum/topic.php?id=533 - () http://mahara.org/interaction/forum/topic.php?id=533 -
References () http://osvdb.org/53893 - () http://osvdb.org/53893 -
References () http://secunia.com/advisories/33145 - () http://secunia.com/advisories/33145 -
References () http://secunia.com/advisories/33170 - Vendor Advisory () http://secunia.com/advisories/33170 - Vendor Advisory
References () http://secunia.com/advisories/34789 - () http://secunia.com/advisories/34789 -
References () http://sourceforge.net/forum/forum.php?forum_id=898542 - Vendor Advisory () http://sourceforge.net/forum/forum.php?forum_id=898542 - Vendor Advisory
References () http://trac.roundcube.net/changeset/2148 - Exploit () http://trac.roundcube.net/changeset/2148 - Exploit
References () http://trac.roundcube.net/ticket/1485618 - Exploit () http://trac.roundcube.net/ticket/1485618 - Exploit
References () http://www.openwall.com/lists/oss-security/2008/12/12/1 - () http://www.openwall.com/lists/oss-security/2008/12/12/1 -
References () http://www.securityfocus.com/archive/1/499489/100/0/threaded - () http://www.securityfocus.com/archive/1/499489/100/0/threaded -
References () http://www.vupen.com/english/advisories/2008/3418 - () http://www.vupen.com/english/advisories/2008/3418 -
References () http://www.vupen.com/english/advisories/2008/3419 - () http://www.vupen.com/english/advisories/2008/3419 -
References () https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a - () https://github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a -
References () https://www.exploit-db.com/exploits/7549 - () https://www.exploit-db.com/exploits/7549 -
References () https://www.exploit-db.com/exploits/7553 - () https://www.exploit-db.com/exploits/7553 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html - () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html - () https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html -

Information

Published : 2008-12-17 02:30

Updated : 2024-11-21 00:54


NVD link : CVE-2008-5619

Mitre link : CVE-2008-5619

CVE.ORG link : CVE-2008-5619


JSON object : View

Products Affected

roundcube

  • webmail
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')