Lucene search

K
githubGitHub Advisory DatabaseGHSA-4QPJ-GXXG-JQG4
HistoryMay 29, 2024 - 1:13 p.m.

Swiftmailer Sendmail transport arbitrary shell execution

2024-05-2913:13:16
GitHub Advisory Database
github.com
4
swiftmailer
sendmail
transport
vulnerability
fixed
upgrade

AI Score

7.2

Confidence

High

Prior to 5.2.1, the sendmail transport (Swift_Transport_SendmailTransport) was vulnerable to an arbitrary shell execution if the “From” header came from a non-trusted source and no “Return-Path” is configured. This has been fixed in 5.2.1. If you are using sendmail as a transport, you are encouraged to upgrade as soon as possible.

Affected configurations

Vulners
Node
swiftmailerswiftmailerRange4.0.05.2.1
VendorProductVersionCPE
swiftmailerswiftmailer*cpe:2.3:a:swiftmailer:swiftmailer:*:*:*:*:*:*:*:*

AI Score

7.2

Confidence

High