GHSA-gff2-p6vm-3p8g: ZendFramework potential remote code execution in zend-mail via Sendmail adapter
When using the zend-mail component to send email via the Zend\Mail\Transport\Sendmail transport
, a malicious user may be able to inject arbitrary parameters to the system sendmail program. The attack is performed by providing additional quote characters within an address; when unsanitized, they can be interpreted as additional command line arguments, leading to the vulnerability.
References
- github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zendframework/ZF2016-04.yaml
- github.com/advisories/GHSA-gff2-p6vm-3p8g
- github.com/zendframework/zendframework
- github.com/zendframework/zendframework/commit/7c1e89815f5a9c016f4b8088e59b07cb2bf99dc0
- web.archive.org/web/20201107093523/https://framework.zend.com/security/advisory/ZF2016-04
Detect and mitigate GHSA-gff2-p6vm-3p8g with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →