Deserialization of Untrusted Data Affecting libphp-phpmailer package, versions <6.2.0-2


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.8% (82nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-LIBPHPPHPMAILER-1277595
  • published1 May 2021
  • disclosed28 Apr 2021

Introduced: 28 Apr 2021

CVE-2020-36326  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

Upgrade Debian:11 libphp-phpmailer to version 6.2.0-2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libphp-phpmailer package and not the libphp-phpmailer package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.

CVSS Base Scores

version 3.1