Main
Vulnerability Database
Exploits
ID:1199 - Exploit for Command injection in SquirrelMail - CVE-2017-7692
ID:1199 - Exploit for Command injection in SquirrelMail - CVE-2017-7692
Published: March 18, 2020
Vulnerability identifier: #VU6596
Vulnerability risk: High
CVE-ID: CVE-2017-7692
CWE-ID: CWE-77
Exploitation vector: Remote access
Vulnerable software:
SquirrelMail
SquirrelMail
Link to public exploit:
Vulnerability description
The vulnerability allows a remote authenticated attacker to execute arbitrary commands on a targeted system.
The weakness exists due to insufficient escaping of user-supplied input by the escapeshellcmd() when configured with Sendmail as the email delivery transport method. A remote attacker can upload a specially crafted sendmail.cf file as an email attachment that is mishandled in a popen call, trigger vulnerability in the Deliver_SendMail.class.php with the initStream function and execute arbitrary shell commands to conduct further attacks.
Successful exploitation of the vulnerability may result in full system compromise.
The weakness exists due to insufficient escaping of user-supplied input by the escapeshellcmd() when configured with Sendmail as the email delivery transport method. A remote attacker can upload a specially crafted sendmail.cf file as an email attachment that is mishandled in a popen call, trigger vulnerability in the Deliver_SendMail.class.php with the initStream function and execute arbitrary shell commands to conduct further attacks.
Successful exploitation of the vulnerability may result in full system compromise.
Remediation
Install update from vendor's website.