Vulnerability DatabaseGHSA-xjw3-5r5c-m5ph

GHSA-xjw3-5r5c-m5ph
PHP vulnerability analysis and mitigation

Overview

A remote code execution vulnerability was discovered in the Swift Mailer library affecting typo3/swiftmailer and neos/swiftmailer packages. The vulnerability was disclosed on January 6th, 2017, and affected all versions before 5.4.5. The issue was assigned CVE-2016-10074 and was considered of Critical severity (Neos Blog).

Technical details

The vulnerability specifically affects installations using the default mail() transport in the Swift Mailer library. The issue was identified as a Remote Code Execution (RCE) vulnerability, which could potentially allow attackers to execute arbitrary code on affected systems. The vulnerability impacts versions >= 4.1.0, < 4.1.99 and >= 5.4.0, < 5.4.5 of the package (GitHub Advisory).

Impact

The vulnerability could potentially allow remote code execution on affected systems when using the default mail() transport. However, systems not using the default mail() transport were not affected by this particular vulnerability (Neos Blog).

Mitigation and workarounds

The vulnerability was patched in versions 4.1.99 and 5.4.5 of the package. Users were strongly encouraged to update immediately to these versions. For those using typo3/swiftmailer, it was recommended to switch to neos/swiftmailer during the update process. The patch level release contained no breaking changes and could be fetched via composer (Neos Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management