Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10045

Опубликовано: 30 дек. 2016
Источник: debian
EPSS Критический

Описание

The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libphp-phpmailernot-affectedpackage

Примечания

  • https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html

EPSS

Процентиль: 100%
0.93786
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.

CVSS3: 9.8
nvd
больше 8 лет назад

The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code by leveraging improper interaction between the escapeshellarg function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033.

CVSS3: 9.8
github
больше 5 лет назад

Remote code execution in PHPMailer

EPSS

Процентиль: 100%
0.93786
Критический