First published: Wed Dec 17 2008(Updated: )
html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roundcube Webmail | =0.2.1-alpha | |
Roundcube Webmail | =0.2.3-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5619 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2008-5619, update PHPMailer to version 5.2.10 or later, or upgrade to the latest version of the affected software.
CVE-2008-5619 affects PHPMailer prior to 5.2.10, RoundCube versions 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03.
CVE-2008-5619 involves remote code execution attacks through crafted input processed by the preg_replace function.
While CVE-2008-5619 was disclosed in 2008, it remains relevant for systems running outdated versions of the affected software.