vendor:
PHPMailer
by:
Dawid Golunski and Spencer McIntyre
9,8
CVSS
CRITICAL
Remote Code Execution
78
CWE
Product Name: PHPMailer
Affected Version From: PHPMailer <5.2.18
Affected Version To: PHPMailer 5.2.18 - 5.2.19
Patch Exists: YES
Related CWE: CVE-2016-10033, CVE-2016-10045
CPE: none
Metasploit:
https://www.rapid7.com/db/vulnerabilities/moodle-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-10033/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-10033/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-10033/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2016-10033/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-10033/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/f5-big-ip-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2016-10045/, https://www.rapid7.com/db/vulnerabilities/moodle-cve-2016-10045/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: PHP
2016
PHPMailer Sendmail Argument Injection
PHPMailer versions up to and including 5.2.19 are affected by a vulnerability which can be leveraged by an attacker to write a file with partially controlled contents to an arbitrary location through injection of arguments that are passed to the sendmail binary. This module writes a payload to the web root of the webserver before then executing it with an HTTP request. The user running PHPMailer must have write access to the specified WEB_ROOT directory and successful exploitation can take a few minutes.
Mitigation:
Upgrade to PHPMailer version 5.2.20 or later.