HTTP: PHPMailer mail Sender Command Injection
A command injection vulnerability has been reported in the PHPMailer library package. Successful exploitation results in arbitrary command execution on the target server with the privileges of the web service.
Extended Description
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Affected Products
Wordpress wordpress
References
BugTraq: 95108
CVE: CVE-2016-10074
URL: https://github.com/phpmailer/phpmailer/blob/master/security.md
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Joomla
Wordpress
Phpmailer_project
7.5