HTTP: PHPMailer Mail escapeshellarg Command Injection

A command injection vulnerability has been reported in the PHPMailer library package. Successful exploitation results in arbitrary command execution on the target server with the privileges of the web service.

Extended Description

The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.

Affected Products

Wordpress wordpress

Short Name
HTTP:PHP:PHPMAILER-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2016-10045 Command Injection Mail PHPMailer bid:95130 escapeshellarg
Release Date
06/05/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3659
False Positive
Unknown
Vendors

Joomla

Wordpress

Phpmailer_project

CVSS Score

7.5

Found a potential security threat?