← Zuruck zu CVEs
CVE-2016-10045
CRITICAL9.8
Beschreibung
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/30/2016
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
joomla:joomla\!phpmailer_project:phpmailerwordpress:wordpress
Schwachen (CWE)
CWE-77
Referenzen
http://openwall.com/lists/oss-security/2016/12/28/1(cve@mitre.org)
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html(cve@mitre.org)
http://seclists.org/fulldisclosure/2016/Dec/81(cve@mitre.org)
http://www.securityfocus.com/archive/1/539967/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/95130(cve@mitre.org)
http://www.securitytracker.com/id/1037533(cve@mitre.org)
https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html(cve@mitre.org)
https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20(cve@mitre.org)
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities(cve@mitre.org)
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html(cve@mitre.org)
https://www.exploit-db.com/exploits/40969/(cve@mitre.org)
https://www.exploit-db.com/exploits/40986/(cve@mitre.org)
https://www.exploit-db.com/exploits/42221/(cve@mitre.org)
http://openwall.com/lists/oss-security/2016/12/28/1(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2016/Dec/81(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/539967/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/95130(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037533(af854a3a-2127-422b-91ae-364da2661108)
https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities(af854a3a-2127-422b-91ae-364da2661108)
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40969/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40986/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42221/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.