{"id":"MGASA-2017-0022","summary":"Updated php-phpmailer packages fix security vulnerabilities","details":"It was discovered that PHPMailer, a popular library to send email from\nPHP applications, allowed a remote attacker to execute code if they were\nable to provide a crafted Sender address (CVE-2016-10033).\n\nIt was discovered that PHPMailer prior to 5.2.22 contained a local file\ndisclosure vulnerability if content passed to `msgHTML()` was sourced\nfrom unfiltered user input (CVE-2017-5223).\n","modified":"2026-04-16T01:48:03.814869222Z","published":"2017-01-27T09:19:09Z","upstream":["CVE-2016-10033","CVE-2017-5223"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0022.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=20069"},{"type":"WEB","url":"http://kalilinux.co/2017/01/12/phpmailer-cve-2017-5223-local-information-disclosure-vulnerability-analysis/"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3750"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/JTXZSKTKOWTVEXDS76R6GJGI3MLA2LL5/"}],"affected":[{"package":{"name":"php-phpmailer","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/php-phpmailer?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.2.22-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0022.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}