logo

CVE-2016-10034 zendframework/zend-mail

Package

Manager: composer
Name: zendframework/zend-mail
Vulnerable Version: >=0 <2.4.11 || >=2.5 <=2.5.2 || >=2.6 <=2.6.2 || >=2.7 <2.7.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.82322 pctl0.99177

Details

zend-mail remote code execution via Sendmail adapter The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.

Metadata

Created: 2022-05-14T02:19:49Z
Modified: 2024-04-23T23:13:14Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-r9mw-gwx9-v3h5/GHSA-r9mw-gwx9-v3h5.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-r9mw-gwx9-v3h5
Finding: F422
Auto approve: 1