2017-10-16 12:31:07 -04:00
{
2019-03-17 22:13:21 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2016-10033" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-17 22:13:21 +00:00
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \\\" (backslash double quote) in a crafted Sender property."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html" ,
"refsource" : "MISC" ,
"url" : "http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html"
} ,
{
"name" : "https://www.drupal.org/psa-2016-004" ,
"refsource" : "CONFIRM" ,
"url" : "https://www.drupal.org/psa-2016-004"
} ,
{
"name" : "42221" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/42221/"
} ,
{
"name" : "40969" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/40969/"
} ,
{
"name" : "41962" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/41962/"
} ,
{
"name" : "40968" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/40968/"
} ,
{
"name" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html" ,
"refsource" : "MISC" ,
"url" : "https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html"
} ,
{
"name" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18"
} ,
{
"name" : "20161227 PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033]" ,
"refsource" : "BUGTRAQ" ,
"url" : "http://www.securityfocus.com/archive/1/539963/100/0/threaded"
} ,
{
"name" : "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities"
} ,
{
"name" : "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html" ,
"refsource" : "MISC" ,
"url" : "http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html"
} ,
{
"name" : "40974" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/40974/"
} ,
{
"name" : "40986" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/40986/"
} ,
{
"name" : "40970" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/40970/"
} ,
{
"name" : "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection" ,
"refsource" : "MISC" ,
"url" : "http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection"
} ,
{
"name" : "41996" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/41996/"
} ,
{
"name" : "20161227 PHPMailer < 5.2.18 Remote Code Execution [CVE-2016-10033]" ,
"refsource" : "FULLDISC" ,
"url" : "http://seclists.org/fulldisclosure/2016/Dec/78"
} ,
{
"name" : "95108" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/95108"
} ,
{
"name" : "1037533" ,
"refsource" : "SECTRACK" ,
"url" : "http://www.securitytracker.com/id/1037533"
} ,
{
"name" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html" ,
"refsource" : "CONFIRM" ,
"url" : "https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"
} ,
{
"name" : "42024" ,
"refsource" : "EXPLOIT-DB" ,
"url" : "https://www.exploit-db.com/exploits/42024/"
}
]
}
}