PHP mb_send_mail() Function Parameter Security Bypass

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server uses a version of PHP that is affected by a
security bypass vulnerability.

Description :

According to its banner, the version of PHP installed on the remote
host is affected by a flaw that allows an attacker to gain
unauthorized privileges. When used with sendmail and when accepting
remote input for the additional_parameters argument to the
mb_send_mail function, it is possible for context-dependent attackers
to read and create arbitrary files.

See also :

Solution :

There is no known solution at this time.

Risk factor :

Low / CVSS Base Score : 3.2
CVSS Temporal Score : 3.0
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 17716 ()

Bugtraq ID: 16878

CVE ID: CVE-2006-1014

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now