php-mail vulnerable to header forgery
Bug #71738 reported by
nodata
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
php-mail (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: php-mail
PEAR Mail < 1.1.13 is vulnerable to header forgery
This means that the mail() function can be passed unwanted headers, allowing a php script to be hijacked to send bulk e-mail.
For an example of the attack see here:
http://
This bug hit us yesterday, it's a wonder we're not blacklisted.
To post a comment you must log in.
An upgrade to 1.1.14 is needed. pear.php. net/package/ Mail/download/ All
You can view the changelog here:
http://
Version 1.11.1 is the first fix "We now guard against email injection exploits"
Version 1.1.14 includes the fix, plus a revision to the fix "Fix missing seperation between headers and body in the SMTP driver"
Unfortunately we were blacklisted - by aol. Not good.