HTTP: PHPMailer mail Sender Command Injection

A command injection vulnerability has been reported in the PHPMailer library package. Successful exploitation results in arbitrary command execution on the target server with the privileges of the web service.

Extended Description

The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.

Affected Products

Wordpress wordpress

Short Name
HTTP:SQL:PHPMAILER-COM-INJ
Severity
Major
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2016-10033 CVE-2016-10074 Command Injection PHPMailer Sender bid:95108 mail
Release Date
03/16/2017
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Rarely
Vendors

Joomla

Wordpress

Phpmailer_project

CVSS Score

7.5

Found a potential security threat?