Bug 1020141 - (CVE-2017-5223) VUL-0: CVE-2017-5223: PHPMailer msgHTML local file disclosure
(CVE-2017-5223)
VUL-0: CVE-2017-5223: PHPMailer msgHTML local file disclosure
Status: RESOLVED WORKSFORME
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/178705/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2017-01-16 12:44 UTC by Andreas Stieger
Modified: 2017-01-16 12:45 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2017-01-16 12:44:36 UTC
An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method
applies transformations to an HTML document to make it usable as an email
message body. One of the transformations is to convert relative image URLs into
attachments using a script-provided base directory. If no base directory is
provided, it resolves to /, meaning that relative image URLs get treated as
absolute local file paths and added as attachments. To form a remote
vulnerability, the msgHTML method must be called, passed an unfiltered,
user-supplied HTML document, and must not set a base directory.

https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md



References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5223
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/
Comment 1 Andreas Stieger 2017-01-16 12:45:45 UTC
PHPMailer not packaged separately, and not found shipped in a maintained SLE product. 
Known to be bundled in OBS: server:php:applications/mantis