⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: Apply updates per vendor instructions..
CVE-2020-7247 — OS Command Injection in Opensmtpd
Severity
9.8CRITICALNVD
EPSS
94.1%
top 0.09%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 29
KEV addedMar 25
KEV dueApr 15
Latest updateFeb 2
CISA Required Action: Apply updates per vendor instructions.
Description
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Also affects: Debian Linux 10.0, 9.0, Fedora 32, Ubuntu Linux 18.04, 19.10
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
5Nuclei▶
OpenSMTPD 6.4.0-6.6.1 - Remote Code Execution
🔍Detection Rules
1📋Vendor Advisories
4🕵️Threat Intelligence
7📄Research Papers
3💬Community
3Bugzilla▶
CVE-2020-7247 opensmtpd: arbitrary commands execution in smtp_mailaddr in smtp_session.c via crafted SMTP session [fedora-all]↗2020-02-03
Bugzilla▶
CVE-2020-7247 opensmtpd: arbitrary commands execution in smtp_mailaddr in smtp_session.c via crafted SMTP session↗2020-02-03
Bugzilla▶
CVE-2020-7247 opensmtpd: arbitrary commands execution in smtp_mailaddr in smtp_session.c via crafted SMTP session [epel-all]↗2020-02-03