vendor:
SwiftMailer
by:
Dawid Golunski
9,8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: SwiftMailer
Affected Version From: SwiftMailer <= 5.4.5-DEV
Affected Version To: SwiftMailer <= 5.4.5-DEV
Patch Exists: YES
Related CWE: CVE-2016-10074
CPE: a:swiftmailer:swiftmailer
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Sendmail MTA
2016
SwiftMailer <= 5.4.5-DEV Remote Code Execution (CVE-2016-10074)
A vulnerability in SwiftMailer <= 5.4.5-DEV allows attackers to inject malicious parameters into the sendmail command, which can be used to write a malicious payload into a file. The payload is passed in the body of the message and the resulting file will contain the payload. The /var/www/cache directory must be writable by the web user for the exploit to work.
Mitigation:
Upgrade to the latest version of SwiftMailer, which is not vulnerable to this exploit.