The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.
References
Link | Resource |
---|---|
https://legalhackers.com/advisories/ZendFramework-Exploit-ZendMail-Remote-Code-Exec-CVE-2016-10034-Vuln.html | Exploit Technical Description Third Party Advisory |
https://framework.zend.com/security/advisory/ZF2016-04 | Exploit Technical Description Vendor Advisory |
http://www.securityfocus.com/bid/95144 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037539 | |
https://www.exploit-db.com/exploits/42221/ | |
https://www.exploit-db.com/exploits/40986/ | |
https://www.exploit-db.com/exploits/40979/ | |
https://security.gentoo.org/glsa/201804-10 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2016-12-30 11:59
Updated : 2018-10-21 03:29
NVD link : CVE-2016-10034
Mitre link : CVE-2016-10034
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
zend
- zend-mail
- zend_framework