The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/95144 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1037539 - | |
References | () https://framework.zend.com/security/advisory/ZF2016-04 - Exploit, Technical Description, Vendor Advisory | |
References | () https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201804-10 - | |
References | () https://www.exploit-db.com/exploits/40979/ - | |
References | () https://www.exploit-db.com/exploits/40986/ - | |
References | () https://www.exploit-db.com/exploits/42221/ - |
Information
Published : 2016-12-30 19:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10034
Mitre link : CVE-2016-10034
CVE.ORG link : CVE-2016-10034
JSON object : View
Products Affected
zend
- zend-mail
- zend_framework
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')