Описание
The send function in the ezcMailMtaTransport class in Zeta Components Mail before 1.8.2 does not properly restrict the set of characters used in the ezcMail returnPath property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing "-X/path/to/wwwroot/file.php."
Ссылки
- Third Party AdvisoryVDB Entry
- Issue TrackingThird Party Advisory
- Issue TrackingRelease NotesThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingThird Party Advisory
- Issue TrackingRelease NotesThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party Advisory
- Issue TrackingThird Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 1.8.2 (исключая)
cpe:2.3:a:zetacomponents:mail:*:*:*:*:*:*:*:*
EPSS
Процентиль: 95%
0.20401
Средний
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
CVSS3: 8.1
github
больше 3 лет назад
Zeta Components Mail Arbitrary code execution via a crafted email address
EPSS
Процентиль: 95%
0.20401
Средний
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-94