CVE-2008-5619: Improper Control of Generation of Code ('Code Injection')
(updated )
html2text.php in Chuggnutt HTML to Text Converter, as used in PHPMailer before 5.2.10, RoundCube Webmail (roundcubemail) 0.2-1.alpha and 0.2-3.beta, Mahara, and AtMail Open 1.03, allows remote attackers to execute arbitrary code via crafted input that is processed by the preg_replace function with the eval switch.
References
- mahara.org/interaction/forum/topic.php?id=533
- osvdb.org/53893
- sourceforge.net/forum/forum.php?forum_id=898542
- trac.roundcube.net/changeset/2148
- trac.roundcube.net/ticket/1485618
- www.openwall.com/lists/oss-security/2008/12/12/1
- github.com/PHPMailer/PHPMailer/commit/8beacc646acb67c995aea10ac5585970efc7355a
- github.com/advisories/GHSA-v5c9-mmw9-829q
- nvd.nist.gov/vuln/detail/CVE-2008-5619
- www.exploit-db.com/exploits/7549
- www.exploit-db.com/exploits/7553
- www.redhat.com/archives/fedora-package-announce/2008-December/msg00783.html
- www.redhat.com/archives/fedora-package-announce/2008-December/msg00802.html
Detect and mitigate CVE-2008-5619 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →