PHPMailer Remote Command Execution Exploit Update 2

PHPMailer is prone to a abuse the mailSend function. This vulnerability allows remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.



This fixes a small try/catch exception error.
Exploit Type - Old
Exploits/OS Command Injection/Known Vulnerabilities
Exploit Platform
Product Name