CVE-2016-10045
Summary
| CVE | CVE-2016-10045 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-12-30 19:59:00 UTC |
| Updated | 2021-09-30 16:30:00 UTC |
| Description | The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| CVE-2016-10033 PHPMailer Sendmail Argument Injection | Rapid7 |
MISC |
www.rapid7.com |
Exploit, Third Party Advisory |
| PHPMailer < 5.2.20 - Remote Code Execution |
EXPLOIT-DB |
www.exploit-db.com |
Exploit, Third Party Advisory |
| About the CVE 2016 10033 and CVE 2016 10045 vulnerabilities · PHPMailer/PHPMailer Wiki · GitHub |
CONFIRM |
github.com |
Patch, Vendor Advisory |
| SecurityFocus |
BUGTRAQ |
www.securityfocus.com |
|
| PHPMailer < 5.2.20 with Exim MTA - Remote Code Execution - PHP webapps Exploit |
EXPLOIT-DB |
www.exploit-db.com |
|
| Full Disclosure: PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch) |
FULLDISC |
seclists.org |
Mailing List, Patch |
| PHPMailer Input Validation Flaw Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker |
SECTRACK |
www.securitytracker.com |
|
| PHPMailer CVE-2016-10045 Incomplete Fix Remote Code Execution Vulnerability |
BID |
www.securityfocus.com |
Exploit, Third Party Advisory, VDB Entry |
| PHPMailer Sendmail Argument Injection ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Exploit, Third Party Advisory |
| PHPMailer Remote Code Execution ≈ Packet Storm |
MISC |
packetstormsecurity.com |
Exploit, Third Party Advisory |
| Release PHPMailer 5.2.20 · PHPMailer/PHPMailer · GitHub |
CONFIRM |
github.com |
Patch, Vendor Advisory |
| PHPMailer < 5.2.20 / SwiftMailer < 5.4.5-DEV / Zend Framework / zend-mail < 2.4.11 - 'AIO' 'PwnScriptum' Remote Code Execution - PHP webapps Exploit |
EXPLOIT-DB |
www.exploit-db.com |
|
| oss-security - Re: PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033] |
MLIST |
openwall.com |
Mailing List, Patch |
| PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass |
MISC |
legalhackers.com |
Exploit, Patch, Third Party Advisory |
| [20161205] - PHPMailer Security Advisory |
CONFIRM |
developer.joomla.org |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 199517 Ubuntu Security Notification for PHPMailer Vulnerabilities (USN-5956-1)