Inclusion of Functionality from Untrusted Control Sphere Affecting libphp-phpmailer package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-LIBPHPPHPMAILER-1311781
  • published18 Jun 2021
  • disclosed17 Jun 2021

Introduced: 17 Jun 2021

CVE-2021-3603  (opens in a new tab)
CWE-829  (opens in a new tab)

How to fix?

There is no fixed version for Debian:9 libphp-phpmailer.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libphp-phpmailer package and not the libphp-phpmailer package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

CVSS Scores

version 3.1