Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-5223Sensitive Information Exposure in Phpmailer

Severity
5.5MEDIUMNVD
OSV9.8
EPSS
2.9%
top 13.59%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 16
Latest updateMar 15

Description

An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method applies transformations to an HTML document to make it usable as an email message body. One of the transformations is to convert relative image URLs into attachments using a script-provided base directory. If no base directory is provided, it resolves to /, meaning that relative image URLs get treated as absolute local file paths and added as attachments. To form a remote vulnerability, the msgHTML method must be call

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

Packagistphpmailer/phpmailer5.0.05.2.22

Patches

🔴Vulnerability Details

6
OSV
libphp-phpmailer vulnerability2023-03-15
OSV
libphp-phpmailer vulnerabilities2023-03-15
OSV
Local file disclosure in PHPMailer2020-03-05
GHSA
Local file disclosure in PHPMailer2020-03-05
OSV
CVE-2017-5223: An issue was discovered in PHPMailer before 52017-01-16

💥Exploits & PoCs

1
Exploit-DB
PHPMailer < 5.2.21 - Local File Disclosure2017-10-25

📋Vendor Advisories

3
Ubuntu
PHPMailer vulnerabilities2023-03-15
Ubuntu
PHPMailer vulnerability2023-03-15
Debian
CVE-2017-5223: libphp-phpmailer - An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method a...2017

💬Community

1
Bugzilla
CVE-2016-10033 phpmailer: Parameter injection via mail() function2017-01-02
CVE-2017-5223 — Sensitive Information Exposure | cvebase