CVE-2017-15806 – zetacomponents/mail
Package
Manager: composer
Name: zetacomponents/mail
Vulnerable Version: >=0 <1.8.2
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.20401 pctl0.95325
Details
Zeta Components Mail Arbitrary code execution via a crafted email address The send function in the ezcMailMtaTransport class in Zeta Components Mail before 1.8.2 does not properly restrict the set of characters used in the ezcMail returnPath property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing "-X/path/to/wwwroot/file.php."
Metadata
Created: 2022-05-17T00:18:44Z
Modified: 2024-04-23T23:01:34Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-hgr8-g756-vmg9/GHSA-hgr8-g756-vmg9.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-hgr8-g756-vmg9
Finding: F422
Auto approve: 1