First published: Wed Jan 06 2016(Updated: )
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be called, passed an unfiltered, user-supplied HTML document, and must not set a base directory.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpmailer/phpmailer | >=5.0.0<5.2.22 | 5.2.22 |
Phpmailer Project Phpmailer | <=5.2.21 | |
debian/libphp-phpmailer | 6.2.0-2 6.6.3-1 6.9.1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of Local File Disclosure is CVE-2017-5223.
CVE-2017-5223 has a severity rating of 5.5 (medium).
The affected software for CVE-2017-5223 includes PHPMailer versions from 5.0.0 up to, but excluding, 5.2.22.
To fix the Local File Disclosure vulnerability, update PHPMailer to version 5.2.22 or later.
You can find more information about CVE-2017-5223 on the GitHub page for PHPMailer releases (https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.22) and the Kali Linux website (http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/).