Bug ID 1035827
Summary VUL-1: CVE-2017-7692: squirrelmail: SquirrelMail <= 1.4.23 Remote Code Execution
Classification openSUSE
Product openSUSE Distribution
Version Leap 42.2
Hardware Other
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee security-team@suse.de
Reporter mikhail.kasimov@gmail.com
QA Contact qa-bugs@suse.de
Found By ---
Blocker ---

Ref: http://seclists.org/oss-sec/2017/q2/114
=============================================
SquirrelMail <= 1.4.23 Remote Code Execution (CVE-2017-7692)

Desc.:
SquirrelMail is affected by a critical Remote Code Execution vulnerability
which stems from insufficient escaping of user-supplied data when
SquirrelMail has been configured with Sendmail as the main transport.
An authenticated attacker may be able to exploit the vulnerability
to execute arbitrary commands on the target and compromise the remote
system.

Discovered by:
Dawid Golunski (https://legalhackers.com : https://ExploitBox.io)
, as well as Filippo Cavallarin (see attached advisory for details)

Official solution:
Vendor seems to have released a new version of 1.4.23 on
squirrelmail-20170424_0200-SVN.stable.tar.gz
which still seems to be vulnerable hence a new subject/thread.

The exploit from my advisory was also confirmed to work on Ubuntu
package: '1.4.23~svn20120406-2ubuntu1.16.04.1'.

Hence the updated version in the subject/advisory title.

Full advisory URL:

https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html



-- 
Regards,
Dawid Golunski
https://legalhackers.com
https://ExploitBox.io
t: @dawid_golunski
=============================================

[1] http://seclists.org/oss-sec/2017/q2/att-114/SquirrelMail_RCE.txt

[2] https://security-tracker.debian.org/tracker/CVE-2017-7692

(open-)SUSE: https://software.opensuse.org/package/squirrelmail

1.4.22 (TW, 42.{1,2}, server:php:applications repo)


You are receiving this mail because: