CVE-2016-10034

Scores

EPSS

0.823high82.3%
0%20%40%60%80%100%

Percentile: 82.3%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \” (backslash double quote) in a crafted e-mail address.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-77

Exploits

Exploit ID: 40979

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40979

Exploit ID: 40986

Source: exploitdb

URL: https://www.exploit-db.com/exploits/40986

Exploit ID: 42221

Source: exploitdb

URL: https://www.exploit-db.com/exploits/42221

Exploit ID: CVE-2016-10034

Source: github-poc

URL: https://github.com/heikipikker/exploit-CVE-2016-10034

Vulnerable Software (6)

Type: Configuration

Product: libphp-phpmailer

Operating System: ubuntu trusty 14.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libphp-phpmailer

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: libphp-phpmailer

Operating System: ubuntu yakkety 16.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: zendframework

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: zend-mail

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:zend:zend-mail:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.4.10",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:zend:ze...

Source: nvd

Type: Configuration

Vendor: *

Product: zend_framework

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.4.10",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list