Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-1931

Опубликовано: 29 янв. 2020
Источник: redhat
CVSS3: 6.7
EPSS Низкий

Описание

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

Отчет

The attack is triggered by malicious specially crafted .cf files which are basically configuration files for spamassasin. These files can be located at:

  1. /usr/share/spamassassin
  2. /etc/mail/spamassassin
  3. user's home directory, in a directory called .spamassassin All of these locations can only be accessed by either the system administrator or by a user having a local shell account on the machine. In order to successfully exploit this flaw, the attacker needs to convince the user to place the malicious configuration files in one of the above locations.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5spamassassinOut of support scope
Red Hat Enterprise Linux 6spamassassinOut of support scope
Red Hat Enterprise Linux 7spamassassinWill not fix
Red Hat Enterprise Linux 8spamassassinFixedRHSA-2020:462504.11.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1802975spamassassin: command injection via crafted configuration file

EPSS

Процентиль: 78%
0.01095
Низкий

6.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
nvd
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
debian
около 6 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3. ...

github
больше 3 лет назад

A command execution issue was found in Apache SpamAssassin prior to 3.4.3. Carefully crafted nefarious Configuration (.cf) files can be configured to run system commands similar to CVE-2018-11805. This issue is less stealthy and attempts to exploit the issue will throw warnings. Thanks to Damian Lukowski at credativ for reporting the issue ethically. With this bug unpatched, exploits can be injected in a number of scenarios though doing so remotely is difficult. In addition to upgrading to SA 3.4.4, we again recommend that users should only use update channels or 3rd party .cf files from trusted places.

CVSS3: 8.1
fstec
около 6 лет назад

Уязвимость фильтра спама с использованием текстового анализа на основе Perl SpamAssassin, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 78%
0.01095
Низкий

6.7 Medium

CVSS3