PHP mb_send_mail() Function Parameter Security Bypass

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote web server uses a version of PHP that is affected by a
security bypass vulnerability.

Description :

According to its banner, the version of PHP installed on the remote
host is affected by a flaw that allows an attacker to gain
unauthorized privileges. When used with sendmail and when accepting
remote input for the additional_parameters argument to the
mb_send_mail function, it is possible for context-dependent attackers
to read and create arbitrary files.

See also :

http://www.securityfocus.com/archive/1/426342/100/0/threaded

Solution :

There is no known solution at this time.

Risk factor :

Low / CVSS Base Score : 3.2
(CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:N)
CVSS Temporal Score : 2.5
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 17716 ()

Bugtraq ID: 16878

CVE ID: CVE-2006-1014