[Bug 1035827] New: VUL-1: CVE-2017-7692: squirrelmail: SquirrelMail <= 1.4.23 Remote Code Execution
http://bugzilla.opensuse.org/show_bug.cgi?id=1035827 Bug ID: 1035827 Summary: VUL-1: CVE-2017-7692: squirrelmail: SquirrelMail <= 1.4.23 Remote Code Execution Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: mikhail.kasimov@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Ref: http://seclists.org/oss-sec/2017/q2/114 ============================================= SquirrelMail <= 1.4.23 Remote Code Execution (CVE-2017-7692) Desc.: SquirrelMail is affected by a critical Remote Code Execution vulnerability which stems from insufficient escaping of user-supplied data when SquirrelMail has been configured with Sendmail as the main transport. An authenticated attacker may be able to exploit the vulnerability to execute arbitrary commands on the target and compromise the remote system. Discovered by: Dawid Golunski (https://legalhackers.com : https://ExploitBox.io) , as well as Filippo Cavallarin (see attached advisory for details) Official solution: Vendor seems to have released a new version of 1.4.23 on squirrelmail-20170424_0200-SVN.stable.tar.gz which still seems to be vulnerable hence a new subject/thread. The exploit from my advisory was also confirmed to work on Ubuntu package: '1.4.23~svn20120406-2ubuntu1.16.04.1'. Hence the updated version in the subject/advisory title. Full advisory URL: https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CV... -- Regards, Dawid Golunski https://legalhackers.com https://ExploitBox.io t: @dawid_golunski ============================================= [1] http://seclists.org/oss-sec/2017/q2/att-114/SquirrelMail_RCE.txt [2] https://security-tracker.debian.org/tracker/CVE-2017-7692 (open-)SUSE: https://software.opensuse.org/package/squirrelmail 1.4.22 (TW, 42.{1,2}, server:php:applications repo) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1035827 Mikhail Kasimov <mikhail.kasimov@gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Alias| |CVE-2017-7692 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1035827 http://bugzilla.opensuse.org/show_bug.cgi?id=1035827#c3 --- Comment #3 from Mikhail Kasimov <mikhail.kasimov@gmail.com> --- Ref: http://seclists.org/oss-sec/2017/q2/135 ============================================ In case anyone needs the patched release, it looks like the patch got included at last in version: squirrelmail-20170427_0200-SVN ============================================ -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1035827 http://bugzilla.opensuse.org/show_bug.cgi?id=1035827#c4 Dirk Stoecker <opensuse@dstoecker.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #4 from Dirk Stoecker <opensuse@dstoecker.de> --- I updated release and beta packages to current snapshots. Release is 1.4.22.20170427.0200, so we have no update issues when they release it officially as 1.4.23. I'd anyway recommend to use the squirrelmail-beta package. :-) -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1035827 http://bugzilla.opensuse.org/show_bug.cgi?id=1035827#c5 --- Comment #5 from Mikhail Kasimov <mikhail.kasimov@gmail.com> --- Thanks for fixing! -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com