First published: Sat Nov 28 2009(Updated: )
Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 for PEAR allows remote attackers to read and write arbitrary files via a crafted $from parameter, a different vector than CVE-2009-4111.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PEAR | =1.1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4023 is classified as a high-severity vulnerability due to its potential to allow remote attackers to read and write arbitrary files.
To fix CVE-2009-4023, it is recommended to upgrade the Mail package to version 1.1.15 or later, which addresses this vulnerability.
CVE-2009-4023 allows attackers to exploit the argument injection vulnerability to perform unauthorized file read and write operations.
CVE-2009-4023 affects the Mail package version 1.1.14 for PEAR.
The root cause of CVE-2009-4023 lies in the insecure handling of the $from parameter in the sendmail implementation of the Mail::Send method.