The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-792-1 | libphp-swiftmailer security update |
Debian DSA |
DSA-3769-1 | libphp-swiftmailer security update |
Github GHSA |
GHSA-pr44-4jfr-286m | Swift Mailer mail transport Command Injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T03:07:32.142Z
Reserved: 2016-12-27T00:00:00
Link: CVE-2016-10074
No data.
Status : Deferred
Published: 2016-12-30T19:59:00.310
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-10074
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA