CVE-2016-10034

CRITICAL

Zend Mail <2.7.2 - RCE

Title source: llm

Description

The setFrom function in the Sendmail adapter in the zend-mail component before 2.4.11, 2.5.x, 2.6.x, and 2.7.x before 2.7.2, and Zend Framework before 2.4.11 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted e-mail address.

Exploits (4)

exploitdb WORKING POC
by phackt_ul · pythonwebappsphp
https://www.exploit-db.com/exploits/42221
exploitdb WORKING POC
by Dawid Golunski · pythonwebappsphp
https://www.exploit-db.com/exploits/40986
exploitdb WORKING POC
by Dawid Golunski · phpwebappsphp
https://www.exploit-db.com/exploits/40979
nomisec WORKING POC
by heikipikker · poc
https://github.com/heikipikker/exploit-CVE-2016-10034

Scores

CVSS v3 9.8
EPSS 0.8232
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-77
Status published
Products (11)
zend/zend_framework < 2.4.10
zend/zend-mail 2.5.0
zend/zend-mail 2.5.1
zend/zend-mail 2.5.2
zend/zend-mail 2.6.0
zend/zend-mail 2.6.1
zend/zend-mail 2.6.2
zend/zend-mail 2.7.0
zend/zend-mail 2.7.1
zend/zend-mail < 2.4.10
... and 1 more
Published Dec 30, 2016
Tracked Since Feb 18, 2026