Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-4560OS Command Injection in Anti-virus Clamav

Severity
7.6HIGHNVD
EPSS
87.4%
top 0.54%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 28
Latest updateMay 1

Description

clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remote attackers to execute arbitrary commands via shell metacharacters that are used in a certain popen call, involving the "recipient field of sendmail."

CVSS vector

AV:N/AC:H/C:C/I:C/A:CExploitability: 4.9 | Impact: 10.0

Affected Packages2 packages

Debianclamav/clamav< 0.91.2-1~volatile1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-86rv-pvv7-jwp8: clamav-milter in ClamAV before 02022-05-01
OSV
CVE-2007-4560: clamav-milter in ClamAV before 02007-08-28
CVEList
CVE-2007-4560: clamav-milter in ClamAV before 02007-08-28

💥Exploits & PoCs

3
Exploit-DB
ClamAV Milter - Blackhole-Mode Remote Code Execution (Metasploit)2010-10-09
Exploit-DB
Sendmail with clamav-milter < 0.91.2 - Remote Command Execution2007-12-21
Exploit-DB
ClamAV Milter 0.92.2 - Blackhole-Mode (Sendmail) Code Execution (Metasploit)2007-08-24

📋Vendor Advisories

1
Debian
CVE-2007-4560: clamav - clamav-milter in ClamAV before 0.91.2, when run in black hole mode, allows remot...2007

💬Community

1
Bugzilla
CVE-2007-4560 ClamAV missing escaping of popen() arguments2007-08-28
CVE-2007-4560 — OS Command Injection | cvebase