Add CVE-2020-7247

This commit is contained in:
tardc 2020-06-10 14:10:30 +08:00
parent 9445ea5500
commit fdecfa2782

View File

@ -0,0 +1,10 @@
# CVE-2020-7247 OpenSMTPD Remote Code Execution Vulnerability
`smtp_mailaddr` in `smtp_session.c` in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
**[FOFA](https://fofa.so/result?qbase64=YmFubmVyPSJvcGVuc210cGQiICYmIHByb3RvY29sPT0ic210cCI%3D) query rule**: banner="opensmtpd" && protocol=="smtp"
# Demo
![](CVE-2020-7247.gif)