Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.12.2023.5956.1
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5956-1)
Summary:The remote host is missing an update for the 'libphp-phpmailer' package(s) announced via the USN-5956-1 advisory.
Description:Summary:
The remote host is missing an update for the 'libphp-phpmailer' package(s) announced via the USN-5956-1 advisory.

Vulnerability Insight:
Dawid Golunski discovered that PHPMailer was not properly escaping user
input data used as arguments to functions executed by the system shell. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2016-10033, CVE-2016-10045)

It was discovered that PHPMailer was not properly escaping characters
in certain fields of the code_generator.php example code. An attacker
could possibly use this issue to conduct cross-site scripting (XSS)
attacks. This issue was only fixed in Ubuntu 16.04 ESM and Ubuntu 18.04
ESM. (CVE-2017-11503)

Yongxiang Li discovered that PHPMailer was not properly converting
relative paths provided as user input when adding attachments to messages,
which could lead to relative image URLs being treated as absolute local
file paths and added as attachments. An attacker could possibly use this
issue to access unauthorized resources and expose sensitive information.
This issue only affected Ubuntu 16.04 ESM. (CVE-2017-5223)

Sehun Oh discovered that PHPMailer was not properly processing untrusted
non-local file attachments, which could lead to an object injection. An
attacker could possibly use this issue to execute arbitrary code. This
issue only affected Ubuntu 16.04 ESM. (CVE-2018-19296)

Elar Lang discovered that PHPMailer was not properly escaping file
attachment names, which could lead to a misinterpretation of file types
by entities processing the message. An attacker could possibly use this
issue to bypass attachment filters. This issue was only fixed in Ubuntu
16.04 ESM and Ubuntu 20.04 ESM. (CVE-2020-13625)

It was discovered that PHPMailer was not properly handling callables in
its validateAddress function, which could result in untrusted code being
called should the global namespace contain a function called 'php'. An
attacker could possibly use this issue to execute arbitrary code. This
issue was only fixed in Ubuntu 20.04 ESM and Ubuntu 22.04 ESM.
(CVE-2021-3603)

Affected Software/OS:
'libphp-phpmailer' package(s) on Ubuntu 16.04, Ubuntu 18.04, Ubuntu 20.04, Ubuntu 22.04.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-10033
BugTraq ID: 95108
http://www.securityfocus.com/bid/95108
Bugtraq: 20161227 PHPMailer < 5.2.18 Remote Code Execution [updated advisory] [CVE-2016-10033] (Google Search)
http://www.securityfocus.com/archive/1/539963/100/0/threaded
https://www.exploit-db.com/exploits/40968/
https://www.exploit-db.com/exploits/40969/
https://www.exploit-db.com/exploits/40970/
https://www.exploit-db.com/exploits/40974/
https://www.exploit-db.com/exploits/40986/
https://www.exploit-db.com/exploits/41962/
https://www.exploit-db.com/exploits/41996/
https://www.exploit-db.com/exploits/42024/
https://www.exploit-db.com/exploits/42221/
http://seclists.org/fulldisclosure/2016/Dec/78
http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html
http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html
http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html
http://www.securitytracker.com/id/1037533
Common Vulnerability Exposure (CVE) ID: CVE-2016-10045
BugTraq ID: 95130
http://www.securityfocus.com/bid/95130
Bugtraq: 20161228 PHPMailer < 5.2.20 Remote Code Execution PoC 0day Exploit (CVE-2016-10045) (Bypass of the CVE-2016-1033 patch) (Google Search)
http://www.securityfocus.com/archive/1/539967/100/0/threaded
http://seclists.org/fulldisclosure/2016/Dec/81
http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html
https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html
http://openwall.com/lists/oss-security/2016/12/28/1
Common Vulnerability Exposure (CVE) ID: CVE-2017-11503
BugTraq ID: 99293
http://www.securityfocus.com/bid/99293/
https://cxsecurity.com/issue/WLB-2017060181
https://packetstormsecurity.com/files/143138/phpmailer-xss.txt
http://www.securitytracker.com/id/1039026
Common Vulnerability Exposure (CVE) ID: CVE-2017-5223
BugTraq ID: 95328
http://www.securityfocus.com/bid/95328
https://www.exploit-db.com/exploits/43056/
http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/
https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md
Common Vulnerability Exposure (CVE) ID: CVE-2018-19296
Debian Security Information: DSA-4351 (Google Search)
https://www.debian.org/security/2018/dsa-4351
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/
https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27
https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6
https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-13625
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/
https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html
SuSE Security Announcement: openSUSE-SU-2020:1060 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html
SuSE Security Announcement: openSUSE-SU-2020:1106 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html
https://usn.ubuntu.com/4505-1/
Common Vulnerability Exposure (CVE) ID: CVE-2021-3603
https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/
https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.