TYPO3-EXT-SA-2017-004: Remote Code Execution in extension "Maag Sendmail" (maag_sendmail)

It has been discovered that the extension "Maag Sendmail" (maag_sendmail) is susceptible to Remote Code Execution.

Release Date: May xx, 2017

Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.

Affected Versions: version 2.0.0 and below

Vulnerability Type: Remote Code Execution

Severity: Low

Suggested CVSS v2.0: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:O/RC:C (What's that?)

CVE: not assigned yet

Problem Description: The extension uses an old version of PHPMailer, which is known to be vulnerable to Remote Code Execution (CVE-2016-10045).

Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension author is no longer maintaining this extension. Please uninstall and delete the extension from your installation.

Credits: Credits go to Clemens Riccabona who discovered and reported the vulnerability.

General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.