GHSA-pr44-4jfr-286m

Suggest an improvement
Source
https://github.com/advisories/GHSA-pr44-4jfr-286m
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-pr44-4jfr-286m/GHSA-pr44-4jfr-286m.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-pr44-4jfr-286m
Aliases
Published
2022-05-17T00:27:49Z
Modified
2024-04-24T22:28:31.585487Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Swift Mailer mail transport Command Injection
Details

The mail transport (aka SwiftTransportMailTransport) in Swift Mailer before 5.4.5 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address in the (1) From, (2) ReturnPath, or (3) Sender header.

Database specific
{
    "nvd_published_at": "2016-12-30T19:59:00Z",
    "cwe_ids": [
        "CWE-77"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-24T22:03:23Z"
}
References

Affected packages

Packagist / swiftmailer/swiftmailer

Package

Name
swiftmailer/swiftmailer
Purl
pkg:composer/swiftmailer/swiftmailer

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.5

Affected versions

4.*

4.1.3
4.1.4
4.1.5
4.1.6
4.1.7

v4.*

v4.1.8
v4.2.0
v4.2.1
v4.2.2
v4.3.0
v4.3.1

v5.*

v5.0.0
v5.0.1
v5.0.2
v5.0.3
v5.1.0
v5.2.0
v5.2.1
v5.2.2
v5.3.0
v5.3.1
v5.4.0
v5.4.1
v5.4.2
v5.4.3
v5.4.4