Vulnerability Note VU#410609

PHP fails to filter ASCII control characters from string arguments of mail() function

Original Release date: 16 Sep 2002 | Last revised: 16 Sep 2002

Overview

PHP does not properly filter parameters to its mail() function.

Description

PHP is a scripting language widely used in web application development. PHP includes a function called mail() that takes message parameters such as recipient address and sends mail using sendmail. PHP does not filter these parameters for inappropriate characters, such as ASCII control characters. When such characters are passed to sendmail, the mail message may be altered and mail headers may be forged.

Documentation of the mail() function does not explain this risk to the developer and does not establish any responsibility on the script developer to filter message parameters before passing them to the mail() function. PHP should filter these characters or document script developers' responsibility to filter these parameters before calling mail().

Impact

Through a PHP script that passes user input to the mail() function, attackers may be able to alter message headers and content.

Solution

The CERT/CC is currently unaware of a practical solution to this problem.

Filter parameters to mail() function

In email addresses, remove any characters not explicitly valid for email addresses. In other fields, use a similar technique based on valid characters for those parameters.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
The PHP GroupUnknown-26 Aug 2002
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Wojciech Purczynski for reporting this vulnerability.

This document was written by Shawn Van Ittersum.

Other Information

  • CVE IDs: Unknown
  • Date Public: 23 Aug 2002
  • Date First Published: 16 Sep 2002
  • Date Last Updated: 16 Sep 2002
  • Severity Metric: 5.52
  • Document Revision: 7

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.