2024-12-08 03:06:42 +00:00

64 lines
3.4 KiB
JSON

{
"id": "CVE-2024-53860",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-27T22:15:05.833",
"lastModified": "2024-11-27T22:15:05.833",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "sp-php-email-handler is a PHP package for handling contact form submissions. Messages sent using this script are vulnerable to abuse, as the script allows anybody to specify arbitrary email recipients and include user-provided content in confirmation emails. This could enable malicious actors to use your server to send spam, phishing emails, or other malicious content, potentially damaging your domain's reputation and leading to blacklisting by email providers. Patched in version 1.0.0 by removing user-provided content from confirmation emails. All pre-release versions (alpha and beta) are vulnerable to this issue and should not be used. There are no workarounds for this issue. Users must upgrade to version 1.0.0 to mitigate the vulnerability."
},
{
"lang": "es",
"value": "sp-php-email-handler es un paquete PHP para gestionar env\u00edos de formularios de contacto. Los mensajes enviados mediante este script son vulnerables a abusos, ya que el script permite a cualquiera especificar destinatarios de correo electr\u00f3nico arbitrarios e incluir contenido proporcionado por el usuario en los correos electr\u00f3nicos de confirmaci\u00f3n. Esto podr\u00eda permitir que actores maliciosos utilicen su servidor para enviar spam, correos electr\u00f3nicos de phishing u otro contenido malicioso, lo que podr\u00eda da\u00f1ar la reputaci\u00f3n de su dominio y provocar que los proveedores de correo electr\u00f3nico lo incluyan en la lista negra. Se ha aplicado un parche en la versi\u00f3n 1.0.0 eliminando el contenido proporcionado por el usuario de los correos electr\u00f3nicos de confirmaci\u00f3n. Todas las versiones preliminares (alfa y beta) son vulnerables a este problema y no se deben utilizar. No existen workarounds para este problema. Los usuarios deben actualizar a la versi\u00f3n 1.0.0 para mitigar la vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/Spencer14420/SPEmailHandler-PHP/commit/6f00dd0d44ff27889aed2980a5ba06e60d83549d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Spencer14420/SPEmailHandler-PHP/security/advisories/GHSA-mj5r-x73q-fjw6",
"source": "security-advisories@github.com"
}
]
}