First published: Sat Jun 30 2001(Updated: )
PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=4.0.5<=4.1.0 | |
PHP | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1246 is considered a high severity vulnerability due to its potential to allow command execution by local users and possibly remote attackers.
To fix CVE-2001-1246, upgrade PHP to version 4.1.2 or later to ensure the mail() function properly cleanses the input.
CVE-2001-1246 affects PHP versions 4.0.5 through 4.1.0, including the specific version 4.0.5.
CVE-2001-1246 can potentially allow command injection attacks through the improper handling of the mail() function's parameters.
CVE-2001-1246 is particularly relevant for PHP installations running in safe mode and using the affected versions.