diff --git a/README.md b/README.md index e5cd9891..85f758d1 100644 --- a/README.md +++ b/README.md @@ -72,6 +72,8 @@ If you don't speak git or just want a tarball, click the 'zip' button on the rig ## Legacy versions PHPMailer 5.2 (which is compatible with PHP 5.0 - 7.0) is no longer being supported for feature updates, and will only be receiving security updates from now on. You will find the latest version of 5.2 in the [5.2-stable branch](https://github.com/PHPMailer/PHPMailer/tree/5.2-stable), and future versions of 5.2 will be tagged with 5.2.x version numbers, so existing Composer configs should remain working. If you're using PHP 5.5 or later, we recommend you make the necessary changes to switch to the 6.0 release. +The 5.2 branch will not receive security updates after December 31st 2018. + ## Upgrading from 5.2 The biggest changes are that source files are now in the `src/` folder, and PHPMailer now declares the namespace `PHPMailer\PHPMailer`. This has several important effects – [read the upgrade guide](https://github.com/PHPMailer/PHPMailer/tree/master/UPGRADING.md) for more details. diff --git a/SECURITY.md b/SECURITY.md index 57a1f136..5e917cd0 100644 --- a/SECURITY.md +++ b/SECURITY.md @@ -2,7 +2,9 @@ Please disclose any vulnerabilities found responsibly - report any security problems found to the maintainers privately. -PHPMailer versions prior to 5.2.24 (released July 26th 2017) have an XSS vulnerability in one of the code examples, [CVE-2017-11503](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11503). The `code_generator.phps` example did not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project. +PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing `phar://` paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. Recorded as [CVE-2018-19296](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19296). See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr. + +PHPMailer versions prior to 5.2.24 (released July 26th 2017) have an XSS vulnerability in one of the code examples, [CVE-2017-11503](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-11503). The `code_generator.phps` example did not filter user input prior to output. This file is distributed with a `.phps` extension, so it it not normally executable unless it is explicitly renamed, and the file is not included when PHPMailer is loaded through composer, so it is safe by default. There was also an undisclosed potential XSS vulnerability in the default exception handler (unused by default). Patches for both issues kindly provided by Patrick Monnerat of the Fedora Project. PHPMailer versions prior to 5.2.22 (released January 9th 2017) have a local file disclosure vulnerability, [CVE-2017-5223](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5223). If content passed into `msgHTML()` is sourced from unfiltered user input, relative paths can map to absolute local file paths and added as attachments. Also note that `addAttachment` (just like `file_get_contents`, `passthru`, `unlink`, etc) should not be passed user-sourced params either! Reported by Yongxiang Li of Asiasecurity. diff --git a/VERSION b/VERSION index 81f0c273..e8738082 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -6.0.5 \ No newline at end of file +6.0.6 \ No newline at end of file diff --git a/changelog.md b/changelog.md index f7b42273..37e7953d 100644 --- a/changelog.md +++ b/changelog.md @@ -1,7 +1,11 @@ # PHPMailer Change Log +## Version 6.0.6 (November 14th 2018) +* **SECURITY** Fix potential object injection vulnerability. Reported by Sehun Oh of cyberone.kr. * Added Tagalog translation, thanks to @StoneArtz * Added Malagache translation, thanks to @Hackinet +* Updated Serbian translation, fixed incorrect language code, thanks to @mmilanovic4 +* Updated Arabic translations (@MicroDroid) * Updated Hungarian translations * Updated Dutch translations * Updated Slovenian translation (@filips123) @@ -12,7 +16,12 @@ * Add constants for common values, such as `text/html` and `quoted-printable`, and use them * Added support for copied headers in DKIM, helping with debugging, and an option to add extra headers to the DKIM signature. See DKIM_sign example for how to use them. Thanks to @gwi-mmuths. * Add Campaign Monitor transaction ID pattern matcher -* Remove deprecated constant and ini values causing warnings in PHP 7.3. +* Remove deprecated constant and ini values causing warnings in PHP 7.3, added PHP 7.3 build to Travis config. +* Expanded test coverage + +## Version 5.2.27 (November 14th 2018) +* **SECURITY** Fix potential object injection vulnerability. Reported by Sehun Oh of cyberone.kr. +* Note that the 5.2 branch is now deprecated and will not receive security updates after 31st December 2018. ## Version 6.0.5 (March 27th 2018) * Re-roll of 6.0.4 to fix missed version file entry. No code changes. diff --git a/src/PHPMailer.php b/src/PHPMailer.php index b0b2abe2..9acb0d70 100644 --- a/src/PHPMailer.php +++ b/src/PHPMailer.php @@ -701,7 +701,7 @@ class PHPMailer * * @var string */ - const VERSION = '6.0.5'; + const VERSION = '6.0.6'; /** * Error severity: message only, continue processing. diff --git a/src/POP3.php b/src/POP3.php index 9b51c8ac..9dab992e 100644 --- a/src/POP3.php +++ b/src/POP3.php @@ -45,7 +45,7 @@ class POP3 * * @var string */ - const VERSION = '6.0.5'; + const VERSION = '6.0.6'; /** * Default POP3 port number. diff --git a/src/SMTP.php b/src/SMTP.php index 6cef06ef..9651e52e 100644 --- a/src/SMTP.php +++ b/src/SMTP.php @@ -34,7 +34,7 @@ class SMTP * * @var string */ - const VERSION = '6.0.5'; + const VERSION = '6.0.6'; /** * SMTP line break constant.