Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-19518 — Argument Injection in Uw-imap
Severity
7.5HIGHNVD
EPSS
93.9%
top 0.13%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 25
Latest updateJan 27
Description
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argumen…
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9
Affected Packages4 packages
Also affects: Debian Linux 8.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04
🔴Vulnerability Details
3GHSA▶
GHSA-5qmr-54g6-4256: University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_r↗2022-05-13
OSV▶
CVE-2018-19518: University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_r↗2018-11-25
VulnCheck
▶
💥Exploits & PoCs
3📋Vendor Advisories
4Debian▶
CVE-2018-19518: uw-imap - University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in P...↗2018