[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2016-10074Date: (C)2017-01-02   (M)2023-12-22


The mail transport (aka Swift_Transport_MailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a " (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
http://seclists.org/fulldisclosure/2016/Dec/86
EXPLOIT-DB-40972
EXPLOIT-DB-40986
EXPLOIT-DB-42221
BID-95140
DSA-3769
http://packetstormsecurity.com/files/140290/SwiftMailer-Remote-Code-Execution.html
https://github.com/swiftmailer/swiftmailer/blob/5.x/CHANGES
https://legalhackers.com/advisories/SwiftMailer-Exploit-Remote-Code-Exec-CVE-2016-10074-Vuln.html

CWE    1
CWE-77
OVAL    4
oval:org.secpod.oval:def:111854
oval:org.secpod.oval:def:111859
oval:org.secpod.oval:def:1900580
oval:org.secpod.oval:def:602751
...

© SecPod Technologies