Lucene search

K
saintSAINT CorporationSAINT:81A1C03FFF7B1B77EB902CD443800305
HistoryJan 05, 2017 - 12:00 a.m.

PHPMailer PwnScriptum Remote Code Execution

2017-01-0500:00:00
SAINT Corporation
download.saintcorporation.com
136

0.971 High

EPSS

Percentile

99.8%

Added: 01/05/2017
BID: 95108

Background

PHPMailer is a PHP class used for sending email from PHP. It is used by many open-source projects, e.g., WordPress, Drupal, and Joomla.

Problem

PHPMailer class mailSend() function is vulnerable to command injection due to failure to properly sanitize the destination email address.

Resolution

Upgrade to PHPMailer 5.2.20 or higher.

References

<http://pwnscriptum.com/&gt;
<https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html&gt;
<https://www.exploit-db.com/exploits/40986/&gt;

Limitations

Exploit works on PHPMailer before 5.2.18.

Exploit targets a common web application component: a contact form. The contact form action parameter value and field names must match the specified value/field names (e.g., send/name/email/msg).

There must be a web-user writable directory under the web application directory.