Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2016-10034


The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.


Published

2016-12-30T19:59:00.217

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-77

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application zend zend_framework ≤ 2.4.10 Yes
Application zend zend-mail ≤ 2.4.10 Yes
Application zend zend-mail 2.5.0 Yes
Application zend zend-mail 2.5.1 Yes
Application zend zend-mail 2.5.2 Yes
Application zend zend-mail 2.6.0 Yes
Application zend zend-mail 2.6.1 Yes
Application zend zend-mail 2.6.2 Yes
Application zend zend-mail 2.7.0 Yes
Application zend zend-mail 2.7.1 Yes

References