mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 10:41:40 +00:00
Add CVE-2020-7247
This commit is contained in:
parent
9445ea5500
commit
fdecfa2782
10
OpenSMTPD/CVE-2020-7247/README.md
Normal file
10
OpenSMTPD/CVE-2020-7247/README.md
Normal file
@ -0,0 +1,10 @@
|
||||
# CVE-2020-7247 OpenSMTPD Remote Code Execution Vulnerability
|
||||
|
||||
`smtp_mailaddr` in `smtp_session.c` in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
|
||||
|
||||
**[FOFA](https://fofa.so/result?qbase64=YmFubmVyPSJvcGVuc210cGQiICYmIHByb3RvY29sPT0ic210cCI%3D) query rule**: banner="opensmtpd" && protocol=="smtp"
|
||||
|
||||
# Demo
|
||||
|
||||

|
||||
|
Loading…
x
Reference in New Issue
Block a user