CVE-2020-36326
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
28/04/2021
Last modified:
07/11/2023
Description
PHPMailer 6.1.8 through 6.4.0 allows object injection through Phar Deserialization via addAttachment with a UNC pathname. NOTE: this is similar to CVE-2018-19296, but arose because 6.1.8 fixed a functionality problem in which UNC pathnames were always considered unreadable by PHPMailer, even in safe contexts. As an unintended side effect, this fix eliminated the code that blocked addAttachment exploitation.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:* | 6.1.8 (including) | 6.4.0 (including) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.7 (including) | 3.7.36 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.8 (including) | 3.8.36 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 3.9 (including) | 3.9.34 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.0 (including) | 4.0.33 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.1 (including) | 4.1.33 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.2 (including) | 4.2.30 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.3 (including) | 4.3.26 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.4 (including) | 4.4.25 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.5 (including) | 4.5.24 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.6 (including) | 4.6.21 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.7 (including) | 4.7.21 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.8 (including) | 4.8.17 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 4.9 (including) | 4.9.18 (excluding) |
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 5.0 (including) | 5.0.13 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/



