OS Command Injection in Exim - CVE-2019-13917

 

OS Command Injection in Exim - CVE-2019-13917

Published: July 25, 2019


Vulnerability identifier: #VU19368
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-13917
CWE-ID: CWE-78
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Exim
Affected software:
Exim

Detailed vulnerability description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to insufficient filtering of user-supplied data under certain conditions, e.g. if your configuration uses the ${sort } expansion. A remote unauthenticated attacker can send a specially crafted email, modify $local_part or $domain items, inject and execute arbitrary OS commands on the target system with root privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system however requires non-default exim configuration.


How to mitigate CVE-2019-13917

Install updates from vendor's website.

Sources