Bug 1020141 (CVE-2017-5223)

Summary: VUL-0: CVE-2017-5223: PHPMailer msgHTML local file disclosure
Product: [Novell Products] SUSE Security Incidents Reporter: Andreas Stieger <astieger>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED WORKSFORME QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None CC: jason.record, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/178705/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Andreas Stieger 2017-01-16 12:44:36 UTC
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method
applies transformations to an HTML document to make it usable as an email
message body. One of the transformations is to convert relative image URLs into
attachments using a script-provided base directory. If no base directory is
provided, it resolves to /, meaning that relative image URLs get treated as
absolute local file paths and added as attachments. To form a remote
vulnerability, the msgHTML method must be called, passed an unfiltered,
user-supplied HTML document, and must not set a base directory.

https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md



References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5223
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/
Comment 1 Andreas Stieger 2017-01-16 12:45:45 UTC
PHPMailer not packaged separately, and not found shipped in a maintained SLE product. 
Known to be bundled in OBS: server:php:applications/mantis