← Retour aux CVEs
CVE-2016-10045
CRITICAL9.8
Description
The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie12/30/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
joomla:joomla\!phpmailer_project:phpmailerwordpress:wordpress
Faiblesses (CWE)
CWE-77
References
http://openwall.com/lists/oss-security/2016/12/28/1(cve@mitre.org)
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html(cve@mitre.org)
http://seclists.org/fulldisclosure/2016/Dec/81(cve@mitre.org)
http://www.securityfocus.com/archive/1/539967/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/95130(cve@mitre.org)
http://www.securitytracker.com/id/1037533(cve@mitre.org)
https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html(cve@mitre.org)
https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20(cve@mitre.org)
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities(cve@mitre.org)
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html(cve@mitre.org)
https://www.exploit-db.com/exploits/40969/(cve@mitre.org)
https://www.exploit-db.com/exploits/40986/(cve@mitre.org)
https://www.exploit-db.com/exploits/42221/(cve@mitre.org)
http://openwall.com/lists/oss-security/2016/12/28/1(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/fulldisclosure/2016/Dec/81(af854a3a-2127-422b-91ae-364da2661108)
http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/539967/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/95130(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037533(af854a3a-2127-422b-91ae-364da2661108)
https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities(af854a3a-2127-422b-91ae-364da2661108)
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40969/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/40986/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/42221/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.