{"id":"UBUNTU-CVE-2016-10033","details":"The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \\\" (backslash double quote) in a crafted Sender property.","modified":"2026-02-04T17:51:11.816366Z","published":"2016-12-30T19:59:00Z","related":["USN-5956-1"],"upstream":["CVE-2016-10033"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-10033"},{"type":"REPORT","url":"https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10033-Vuln.html"},{"type":"REPORT","url":"https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html"},{"type":"REPORT","url":"http://packetstormsecurity.com/files/140291/PHPMailer-Remote-Code-Execution.html"},{"type":"REPORT","url":"http://seclists.org/fulldisclosure/2016/Dec/78"},{"type":"REPORT","url":"https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html"},{"type":"REPORT","url":"https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.18"},{"type":"REPORT","url":"https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities"},{"type":"REPORT","url":"https://www.drupal.org/psa-2016-004"},{"type":"REPORT","url":"https://www.exploit-db.com/exploits/40968/"},{"type":"REPORT","url":"https://www.exploit-db.com/exploits/40970/"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5956-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-10033"},{"type":"REPORT","url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog"}],"affected":[{"package":{"name":"libphp-phpmailer","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libphp-phpmailer@5.2.14+dfsg-1ubuntu0.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.14+dfsg-1ubuntu0.1~esm1"}]}],"versions":["5.2.10+dfsg-1","5.2.14+dfsg-1","5.2.14+dfsg-1build1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"libphp-phpmailer","binary_version":"5.2.14+dfsg-1ubuntu0.1~esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-10033.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}