Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-1946

Опубликовано: 25 мар. 2021
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:apache:spamassassin:*:*:*:*:*:*:*:*
Версия до 3.4.5 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

EPSS

Процентиль: 81%
0.01495
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 7.8
redhat
около 5 лет назад

In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 9.8
debian
около 5 лет назад

In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf ...

rocky
больше 4 лет назад

Moderate: spamassassin security update

CVSS3: 9.8
github
почти 4 года назад

In Apache SpamAssassin before 3.4.5, malicious rule configuration (.cf) files can be configured to run system commands without any output or errors. With this, exploits can be injected in a number of scenarios. In addition to upgrading to SA version 3.4.5, users should only use update channels or 3rd party .cf files from trusted places.

EPSS

Процентиль: 81%
0.01495
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-78
CWE-78