Description
The send function in the ezcMailMtaTransport class in Zeta Components Mail before 1.8.2 does not properly restrict the set of characters used in the ezcMail returnPath property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing "-X/path/to/wwwroot/file.php."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hgr8-g756-vmg9 | Zeta Components Mail Arbitrary code execution via a crafted email address |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T20:04:50.350Z
Reserved: 2017-10-23T00:00:00.000Z
Link: CVE-2017-15806
No data.
Status : Deferred
Published: 2017-11-15T16:29:00.483
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-15806
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA