Lucene search

K
saintSAINT CorporationSAINT:4687A4D4A67507FD1BF340DA1142541C
HistoryJan 17, 2017 - 12:00 a.m.

Swift Mailer PwnScriptum Command Injection

2017-01-1700:00:00
SAINT Corporation
download.saintcorporation.com
54

EPSS

0.944

Percentile

99.2%

Added: 01/17/2017
BID: 95140

Background

Swift Mailer is a component-based library used for sending email from PHP. It is used by many PHP programming frameworks, e.g., Yii2, Laraval, and Symfony.

Problem

Swift Mailer library mail transport (Swift_Transport_MailTransport) is vulnerable to command injection due to failure to properly sanitize the “From”, “ReturnPath” and “Sender” headers.

Resolution

Upgrade to Swift Mailer 5.4.5 or higher.

References

<http://pwnscriptum.com/&gt;
<https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html&gt;
<https://www.exploit-db.com/exploits/40986/&gt;

Limitations

Exploit works on Swift Mailer before 5.4.5.

Exploit targets a common web application component: a contact form. The contact form action parameter value and field names must match the specified value/field names (e.g., send/name/email/msg).

There must be a web-user writable directory under the web application directory.