CVE-2016-10033
Scores
EPSS Score
0.9444
CVSS
3.x 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Description
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
Sources
CWEs
Exploits
Exploit ID: CVE-2016-10033
Source: github-poc
Reference Links
Vulnerable Software
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu artful 17.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu bionic 18.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu cosmic 18.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu disco 19.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu eoan 19.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu focal 20.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu groovy 20.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu hirsute 21.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu impish 21.10
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu jammy 22.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu trusty 14.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu xenial 16.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu yakkety 16.10
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: ubuntu zesty 17.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: libphp-phpmailer
Operating System: debian
{
"fixed": "5.2.14+dfsg-2.1"
}
Source: debian
Type: Configuration
Vendor: joomla
Product: joomla!
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.6.5",
"versionStartIncluding": "1.5.0",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: phpmailer_project
Product: phpmailer
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.18",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd
Type: Configuration
Vendor: wordpress
Product: wordpress
Operating System: * * *
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.7",
"vulnerable": true
}
],
"operator": "OR"
}
Source: nvd