CVE-2017-15806: Arbitrary code execution via a crafted email address
(updated )
The send function in the ezcMailMtaTransport
class does not properly restrict the set of characters used in the ezcMail
returnPath
property, which might allow remote attackers to execute arbitrary code via a crafted email address, as demonstrated by one containing “-X/path/to/wwwroot/file.php.”
References
Detect and mitigate CVE-2017-15806 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →