The send function in the ezcMailMtaTransport class in Zeta Components Mail before 1.8.2 does not properly restrict the set of characters used in the ezcMail returnPath property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing "-X/path/to/wwwroot/file.php."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101866 | Third Party Advisory VDB Entry |
https://github.com/zetacomponents/Mail/issues/58 | Issue Tracking Third Party Advisory |
https://github.com/zetacomponents/Mail/releases/tag/1.8.2 | Issue Tracking Release Notes Third Party Advisory |
https://kay-malwarebenchmark.github.io/blog/cve-2017-15806-critical-rce-vulnerability/ | Issue Tracking Third Party Advisory |
https://kay-malwarebenchmark.github.io/blog/cve-2017-15806-yuan-cheng-dai-ma-zhi-xing-lou-dong/ | Issue Tracking Third Party Advisory |
https://www.exploit-db.com/exploits/43155/ | Issue Tracking Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-11-15T16:00:00
Updated: 2017-11-18T10:57:01
Reserved: 2017-10-23T00:00:00
Link: CVE-2017-15806
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-11-15T16:29:00.483
Modified: 2017-12-02T13:00:35.307
Link: CVE-2017-15806
JSON object: View
Redhat Information
No data.
CWE