Description
The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-r9mw-gwx9-v3h5 | zend-mail remote code execution via Sendmail adapter |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:07:31.976Z
Reserved: 2016-12-23T00:00:00.000Z
Link: CVE-2016-10034
No data.
Status : Deferred
Published: 2016-12-30T19:59:00.217
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-10034
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA