GHSA-4qpj-gxxg-jqg4: Swiftmailer Sendmail transport arbitrary shell execution
Prior to 5.2.1, the sendmail transport (Swift_Transport_SendmailTransport
) was vulnerable to an arbitrary shell execution if the “From” header came from a non-trusted source and no “Return-Path” is configured. This has been fixed in 5.2.1. If you are using sendmail as a transport, you are encouraged to upgrade as soon as possible.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/swiftmailer/swiftmailer/2014-06-13.yaml
- github.com/advisories/GHSA-4qpj-gxxg-jqg4
- github.com/swiftmailer/swiftmailer
- github.com/swiftmailer/swiftmailer/commit/b4b78af55e5e87f5ff07c06c6be7963c44562f80
- github.com/swiftmailer/swiftmailer/commit/efc430606a5faed864b969adfbdc5363ce2115a2
- web.archive.org/web/20150219063146/http://blog.swiftmailer.org/post/88660759928/security-fix-swiftmailer-5-2-1-released
Detect and mitigate GHSA-4qpj-gxxg-jqg4 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →