Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-7247

KEV EPSS 94.11% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-7247

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Openbsd Opensmtpd代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Openbsd Opensmtpd是Openbsd组织的一个基于RFC 5321的SMTP服务端软件。 Openbsd Opensmtpd 存在代码问题漏洞。远程攻击者可通过特制的SMTP session利用该漏洞以root权限执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-7247

#POC DescriptionSource LinkShenlong Link
1Python exploit of cve-2020-7247https://github.com/FiroSolutions/cve-2020-7247-exploitPOC Details
2OpenSMTPD version 6.6.2 remote code execution exploithttps://github.com/superzerosec/cve-2020-7247POC Details
3Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2https://github.com/r0lh/CVE-2020-7247POC Details
4OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploithttps://github.com/QTranspose/CVE-2020-7247-exploitPOC Details
5This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root userhttps://github.com/bytescrappers/CVE-2020-7247POC Details
6PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Executionhttps://github.com/f4T1H21/CVE-2020-7247POC Details
7Proof of concept for CVE-2020-7247 for educational purposes.https://github.com/SimonSchoeni/CVE-2020-7247-POCPOC Details
8Worm written in python, abuses CVE-2020-7247https://github.com/presentdaypresenttime/shai_huludPOC Details
9CVE-2020-7247 Remote Code Execution POChttps://github.com/gatariee/CVE-2020-7247POC Details
10Nonehttps://github.com/minhluannguyen/CVE-2020-7247-reproducerPOC Details
11OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2020/CVE-2020-7247.yamlPOC Details
12Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/OpenSMTPD%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-7247.mdPOC Details
13https://github.com/vulhub/vulhub/blob/master/opensmtpd/CVE-2020-7247/README.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-7247

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-01-29 · 28 CVEs total

CVE-2019-18634Sudo 缓冲区错误漏洞
CVE-2019-20215D-Link DIR-859 操作系统命令注入漏洞
CVE-2019-20216D-Link DIR-859 操作系统命令注入漏洞
CVE-2019-20217D-Link DIR-859 操作系统命令注入漏洞
CVE-2020-7965Webargs 跨站请求伪造漏洞
CVE-2012-5776Dokeos 跨站脚本漏洞
CVE-2019-7654Wowza Media Systems Streaming Engine 跨站请求伪造漏洞
CVE-2019-7656Wowza Media Systems Streaming Engine 跨站脚本漏洞
CVE-2019-7655Wowza Media Systems Streaming Engine 跨站脚本漏洞
CVE-2020-8416BearFTP 资源管理错误漏洞
CVE-2013-2567Zavio IP Cameras 信任管理问题漏洞
CVE-2013-2568Zavio IP Cameras 操作系统命令注入漏洞
CVE-2013-2569Zavio IP Cameras 授权问题漏洞
CVE-2013-3215Vtiger CRM 授权问题漏洞
CVE-2020-8438Ruckus ZoneFlex R500 操作系统命令注入漏洞
CVE-2013-2570Zavio IP Cameras 操作系统命令注入漏洞
CVE-2013-2572多款TP-LINK产品信任管理问题漏洞
CVE-2013-2573TP-LINK IP Cameras TL-SC 3130G、3171G和4171G 操作系统命令注入漏洞
CVE-2020-8432Das U-Boot 资源管理错误漏洞
CVE-2013-2574FOSCAM IP-Camera 安全漏洞

Showing top 20 of 28 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-7247

No comments yet


Leave a comment