PHP imap Remote Command Injection

Strike ID:
E19-5oxq1
CVSS:
7.5 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2018

Description

This strike exploits a remote code execution vulnerability in the PHP imap_open function on Ubuntu or Debian. This vulnerability is due to improper handling of the -oProxyCommand values when a client sends http traffic to the server which has some imap functionality. A remote attacker can exploit this vulnerability by sending crafted http requests to the target server. Successful exploitation results in remote code execution. *Note: Actual exploit depends on server config and other parameters, this exploit demonstrate an server with username, password and hostname parameters. Exploit is under hostname parameter.

CVE

References