CVE-2016-10033
Description
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \' (backslash double quote) in a crafted Sender property.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 91 Days)
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
DraftCommon Consequences
Applicable Platforms
PHPMailer < 5.2.18 - Remote Code Execution
VerifiedPHPMailer < 5.2.18 - Remote Code Execution
View Exploit Code →PHPMailer < 5.2.20 - Remote Code Execution
PHPMailer < 5.2.20 - Remote Code Execution
View Exploit Code →PHPMailer < 5.2.18 - Remote Code Execution
PHPMailer < 5.2.18 - Remote Code Execution
View Exploit Code →PHPMailer < 5.2.18 - Remote Code Execution
PHPMailer < 5.2.18 - Remote Code Execution
View Exploit Code →PHPMailer < 5.2.20 / SwiftMailer < 5.4.5-DEV / …
PHPMailer < 5.2.20 / SwiftMailer < 5.4.5-DEV / Zend Framework / zend-mail < 2.4.11 - 'AIO' 'PwnScriptum' Remote Code Execution
View Exploit Code →WordPress Core 4.6 - Remote Code Execution
WordPress Core 4.6 - Remote Code Execution
View Exploit Code →Vanilla Forums < 2.3 - Remote Code Execution
Vanilla Forums < 2.3 - Remote Code Execution
View Exploit Code →WordPress Plugin PHPMailer 4.6 - Host Header Command …
Verified Metasploit Framework (MSF)WordPress Plugin PHPMailer 4.6 - Host Header Command Injection (Metasploit)
View Exploit Code →PHPMailer < 5.2.20 with Exim MTA - Remote …
PHPMailer < 5.2.20 with Exim MTA - Remote Code Execution
View Exploit Code →Joomla\! by Joomla
cpe:2.3:a:joomla:joomla\!:*:*:*:*:*:*:*:*
Wordpress by Wordpress
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
Phpmailer by Phpmailer Project
cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*