Version 7.1.1 Release Notes
Release Type: Security
Release Date: 29th December 2016
Distribution Types: Full Version, Incremental and via Automatic Updater
PHPMailer Security Advisory
Exploit type: Remote Code Execution in third-party PHPMailer library CVE Numbers: CVE-2016-10033 and CVE-2016-10045
All versions of the third-party PHPMailer library distributed with WHMCS are vulnerable to a remote code execution vulnerability. This is patched in PHPMailer 5.2.20.
At this time we do not believe the deficiency in PHPMailer is exposed in WHMCS due to our own validation of user input. Furthermore, the vulnerability requires being able to pass user input unfiltered to a message's "from" address, which in WHMCS is only defined within the admin configuration and only accessible to a trusted admin user.
Irrespective of the known protections in the WHMCS product, this CVE represents a serious issue for PHPMailer. Therefore to mitigate any undiscovered risk or risk to 3rd party extensions using PHPMailer directly, we are releasing updates for all versions of WHMCS in active and long term support to provide the latest PHPMailer library version 5.2.21.
The fix provided by PHPMailer in 5.2.20 for CVE-2016-10045 introduces stricter validation of the sender email address. In most cases, this will not present any problems. However, the fix does break RFC compliance for sender addresses and so more obscure email addresses while technically valid may be rejected by PHPMailer following this change.
- SECURITY-6099 - Update PHPMailer to v5.2.21- Read blog post announcement