Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10074

Опубликовано: 30 дек. 2016
Источник: debian
EPSS Высокий

Описание

The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libphp-swiftmailerfixed5.4.2-1.1package

Примечания

  • https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html

  • https://github.com/swiftmailer/swiftmailer/issues/844

  • Fixed by https://github.com/swiftmailer/swiftmailer/commit/e6ccf40d856af9598b76eb313b215eed25ae9e86

EPSS

Процентиль: 99%
0.75512
Высокий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

CVSS3: 9.8
nvd
около 9 лет назад

The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

CVSS3: 9.8
github
больше 3 лет назад

Swift Mailer mail transport Command Injection

EPSS

Процентиль: 99%
0.75512
Высокий