7.5
HIGH
CVE-2018-19518
University of Washington IMAP Toolkit Command Injection
Description

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

INFO

Published Date :

Nov. 25, 2018, 10:29 a.m.

Last Modified :

Nov. 7, 2023, 2:55 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

1.6
Public PoC/Exploit Available at Github

CVE-2018-19518 has a 11 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2018-19518 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Canonical ubuntu_linux
1 Debian debian_linux
1 Php php
1 Uw-imap_project uw-imap
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2018-19518.

URL Resource
http://www.securityfocus.com/bid/106018 Broken Link
http://www.securitytracker.com/id/1042157 Broken Link
https://antichat.com/threads/463395/#post-4254681 Exploit Third Party Advisory
https://bugs.debian.org/913775 Mailing List Third Party Advisory
https://bugs.debian.org/913835 Mailing List Third Party Advisory
https://bugs.debian.org/913836 Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=76428 Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=77153 Exploit Mailing List Vendor Advisory
https://bugs.php.net/bug.php?id=77160 Vendor Advisory
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17cdffe45adddb
https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php Exploit Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202003-57 Third Party Advisory
https://security.netapp.com/advisory/ntap-20181221-0004/ Third Party Advisory
https://usn.ubuntu.com/4160-1/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4353 Third Party Advisory
https://www.exploit-db.com/exploits/45914/ Exploit Third Party Advisory VDB Entry
https://www.openwall.com/lists/oss-security/2018/11/22/3 Exploit Mailing List Third Party Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 10 months ago
3 stars 0 fork 0 watcher
Born at : April 15, 2023, 9:31 a.m. This repo has been linked 1 different CVEs too.

一个漏洞POC知识库 目前数量 1000+

poc

Updated: 1 week, 6 days ago
3417 stars 682 fork 682 watcher
Born at : Feb. 20, 2022, 6:43 a.m. This repo has been linked 405 different CVEs too.

安全类各家文库大乱斗

HTML CSS JavaScript Go Python Shell C

Updated: 1 week, 6 days ago
856 stars 214 fork 214 watcher
Born at : Feb. 15, 2022, 3:14 a.m. This repo has been linked 568 different CVEs too.

None

Updated: 1 month ago
82 stars 32 fork 32 watcher
Born at : Oct. 2, 2020, 2:49 p.m. This repo has been linked 1111 different CVEs too.

python-poc

Python Ruby C PHP C++ Assembly HTML VBScript Java Shell

Updated: 3 years ago
0 stars 2 fork 2 watcher
Born at : June 28, 2020, 9:36 a.m. This repo has been linked 22 different CVEs too.

None

Python

Updated: 4 years, 5 months ago
0 stars 0 fork 0 watcher
Born at : April 7, 2020, 8:28 a.m. This repo has been linked 75 different CVEs too.

常用渗透poc收集

Python Ruby C C++ Assembly HTML VBScript PHP Java Shell

Updated: 1 month, 1 week ago
294 stars 114 fork 114 watcher
Born at : Feb. 20, 2020, 6:47 a.m. This repo has been linked 22 different CVEs too.

POC-T强化版本 POC-S , 用于红蓝对抗中快速验证Web应用漏洞, 对功能进行强化以及脚本进行分类添加,自带dnslog等, 平台补充来自vulhub靶机及其他开源项目的高可用POC

pocs poc-t pocsuite pentest-scripts poc cnvd-2020-10487 tomcat-ajp-lfi dnslog

Python

Updated: 1 month ago
356 stars 61 fork 61 watcher
Born at : Jan. 30, 2020, 4:09 p.m. This repo has been linked 19 different CVEs too.

漏洞PoC和Exp收集

Python Ruby PHP HTML Visual Basic Java Shell C C++ PowerShell

Updated: 2 years, 5 months ago
0 stars 11 fork 11 watcher
Born at : Nov. 11, 2019, 7:52 a.m. This repo has been linked 13 different CVEs too.

漏洞PoC和Exp的收集。

Python PHP C++ C PowerShell

Updated: 5 years ago
0 stars 2 fork 2 watcher
Born at : Jan. 6, 2019, 3:16 p.m. This repo has been linked 3 different CVEs too.

some works on CVE-2018-19518

Dockerfile PHP

Updated: 4 years ago
0 stars 0 fork 0 watcher
Born at : Dec. 31, 2018, 4:36 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2018-19518 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2018-19518 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Added Reference MITRE https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=e5bfea64c81ae34816479bb05d17cdffe45adddb [No types assigned]
    Removed Reference MITRE https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb
  • Modified Analysis by [email protected]

    Apr. 18, 2022

    Action Type Old Value New Value
    Removed CVSS V3 NIST AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CVSS V3.1 NIST AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.securityfocus.com/bid/106018 Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/106018 Broken Link
    Changed Reference Type http://www.securitytracker.com/id/1042157 Third Party Advisory, VDB Entry http://www.securitytracker.com/id/1042157 Broken Link
    Changed Reference Type https://bugs.php.net/bug.php?id=77160 Permissions Required, Vendor Advisory https://bugs.php.net/bug.php?id=77160 Vendor Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html Third Party Advisory https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html No Types Assigned https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html Mailing List, Third Party Advisory
    Changed Reference Type https://security.gentoo.org/glsa/202003-57 No Types Assigned https://security.gentoo.org/glsa/202003-57 Third Party Advisory
    Changed Reference Type https://usn.ubuntu.com/4160-1/ No Types Assigned https://usn.ubuntu.com/4160-1/ Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* *cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Dec. 29, 2021

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2021/12/msg00031.html [No Types Assigned]
  • CWE Remap by [email protected]

    Aug. 24, 2020

    Action Type Old Value New Value
    Changed CWE CWE-78 CWE-88
  • CVE Modified by [email protected]

    Mar. 26, 2020

    Action Type Old Value New Value
    Added Reference https://security.gentoo.org/glsa/202003-57 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 21, 2019

    Action Type Old Value New Value
    Added Reference https://usn.ubuntu.com/4160-1/ [No Types Assigned]
  • Modified Analysis by [email protected]

    Mar. 05, 2019

    Action Type Old Value New Value
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html No Types Assigned https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:a:university_of_washington:uw-imap:2007f:*:*:*:*:*:*:* OR *cpe:2.3:a:uw-imap_project:uw-imap:2007f:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Mar. 02, 2019

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2019/03/msg00001.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Feb. 04, 2019

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:M/Au:S/C:C/I:C/A:C)
    Added CVSS V3 AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://antichat.com/threads/463395/#post-4254681 No Types Assigned https://antichat.com/threads/463395/#post-4254681 Exploit, Third Party Advisory
    Changed Reference Type https://bugs.debian.org/913835 No Types Assigned https://bugs.debian.org/913835 Mailing List, Third Party Advisory
    Changed Reference Type https://bugs.php.net/bug.php?id=76428 No Types Assigned https://bugs.php.net/bug.php?id=76428 Exploit, Mailing List, Vendor Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20181221-0004/ No Types Assigned https://security.netapp.com/advisory/ntap-20181221-0004/ Third Party Advisory
    Changed Reference Type https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php No Types Assigned https://github.com/Bo0oM/PHP_imap_open_exploit/blob/master/exploit.php Exploit, Third Party Advisory
    Changed Reference Type http://www.securityfocus.com/bid/106018 No Types Assigned http://www.securityfocus.com/bid/106018 Third Party Advisory, VDB Entry
    Changed Reference Type https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb No Types Assigned https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb Mailing List, Patch, Third Party Advisory
    Changed Reference Type http://www.securitytracker.com/id/1042157 No Types Assigned http://www.securitytracker.com/id/1042157 Third Party Advisory, VDB Entry
    Changed Reference Type https://bugs.debian.org/913836 No Types Assigned https://bugs.debian.org/913836 Mailing List, Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4353 No Types Assigned https://www.debian.org/security/2018/dsa-4353 Third Party Advisory
    Changed Reference Type https://bugs.php.net/bug.php?id=77153 No Types Assigned https://bugs.php.net/bug.php?id=77153 Exploit, Mailing List, Vendor Advisory
    Changed Reference Type https://bugs.php.net/bug.php?id=77160 No Types Assigned https://bugs.php.net/bug.php?id=77160 Permissions Required, Vendor Advisory
    Changed Reference Type https://www.openwall.com/lists/oss-security/2018/11/22/3 No Types Assigned https://www.openwall.com/lists/oss-security/2018/11/22/3 Exploit, Mailing List, Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html Mailing List, Third Party Advisory
    Changed Reference Type https://bugs.debian.org/913775 No Types Assigned https://bugs.debian.org/913775 Mailing List, Third Party Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/45914/ No Types Assigned https://www.exploit-db.com/exploits/45914/ Exploit, Third Party Advisory, VDB Entry
    Added CWE CWE-78
    Added CPE Configuration OR *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 5.6.0 up to (including) 5.6.38 *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (including) 7.0.32 *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 7.1.0 up to (including) 7.1.24 *cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions from (including) 7.2.0 up to (including) 7.2.12
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:university_of_washington:uw-imap:2007f:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Dec. 22, 2018

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20181221-0004/ [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 17, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/12/msg00006.html [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 11, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4353 [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 01, 2018

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/45914/ [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 28, 2018

    Action Type Old Value New Value
    Added Reference https://git.php.net/?p=php-src.git;a=commit;h=e5bfea64c81ae34816479bb05d17cdffe45adddb [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 28, 2018

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/106018 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 27, 2018

    Action Type Old Value New Value
    Added Reference http://www.securitytracker.com/id/1042157 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2018-19518 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

96.87 }} -0.04%

score

0.99688

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability