tt9133github / ForTest2

0 stars 0 forks source link

CVE-2021-3603 (High) detected in moodle/moodle-v2.6.2 #429

Open mend-bolt-for-github[bot] opened 2 months ago

mend-bolt-for-github[bot] commented 2 months ago

CVE-2021-3603 - High Severity Vulnerability

Vulnerable Library - moodle/moodle-v2.6.2

Moodle - the world's open source learning platform

Dependency Hierarchy: - :x: **moodle/moodle-v2.6.2** (Vulnerable Library)

Found in HEAD commit: 27e1f740a162e55490d9ca929f243afbaa92476c

Found in base branch: master

Vulnerability Details

PHPMailer 6.4.1 and earlier contain a vulnerability that can result in untrusted code being called (if such code is injected into the host project's scope by other means). If the $patternselect parameter to validateAddress() is set to 'php' (the default, defined by PHPMailer::$validator), and the global namespace contains a function called php, it will be called in preference to the built-in validator of the same name. Mitigated in PHPMailer 6.5.0 by denying the use of simple strings as validator function names.

Publish Date: 2021-06-17

URL: CVE-2021-3603

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3603

Release Date: 2021-06-17

Fix Resolution: v6.5.0


Step up your Open Source Security Game with Mend here