The mailSend
function in the default isMail
transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted Sender
property.
Fixed in 5.2.18
Filter and validate user input before passing it to internal functions.
https://nvd.nist.gov/vuln/detail/CVE-2016-10033
Related to a follow-on issue in https://nvd.nist.gov/vuln/detail/CVE-2016-10045
If you have any questions or comments about this advisory:
packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html
packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html
seclists.org/fulldisclosure/2016/Dec/78
www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection
www.securityfocus.com/archive/1/539963/100/0/threaded
www.securityfocus.com/bid/95108
www.securitytracker.com/id/1037533
developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html
github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10033.yaml
github.com/PHPMailer/PHPMailer
github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18
github.com/PHPMailer/PHPMailer/security/advisories/GHSA-5f37-gxvh-23v6
github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities
legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
nvd.nist.gov/vuln/detail/CVE-2016-10033
www.drupal.org/psa-2016-004
www.exploit-db.com/exploits/40968
www.exploit-db.com/exploits/40969
www.exploit-db.com/exploits/40970
www.exploit-db.com/exploits/40974
www.exploit-db.com/exploits/40986
www.exploit-db.com/exploits/41962
www.exploit-db.com/exploits/41996
www.exploit-db.com/exploits/42024
www.exploit-db.com/exploits/42221