CVE-2020-7247

CRITICAL KEV NUCLEI

Openbsd Opensmtpd - Improper Exception Handling

Title source: rule

Description

smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.

Exploits (15)

nomisec WORKING POC 25 stars
by FiroSolutions · poc
https://github.com/FiroSolutions/cve-2020-7247-exploit
nomisec WORKING POC 11 stars
by QTranspose · remote
https://github.com/QTranspose/CVE-2020-7247-exploit
nomisec WORKING POC 5 stars
by r0lh · poc
https://github.com/r0lh/CVE-2020-7247
nomisec WORKING POC 4 stars
by superzerosec · remote
https://github.com/superzerosec/cve-2020-7247
nomisec WORKING POC 2 stars
by SimonSchoeni · remote
https://github.com/SimonSchoeni/CVE-2020-7247-POC
nomisec WORKING POC 2 stars
by f4T1H21 · remote
https://github.com/f4T1H21/CVE-2020-7247
nomisec WORKING POC 2 stars
by presentdaypresenttime · poc
https://github.com/presentdaypresenttime/shai_hulud
nomisec WORKING POC 1 stars
by minhluannguyen · remote
https://github.com/minhluannguyen/CVE-2020-7247-reproducer
gitlab WORKING POC
by f4T1H21 · remote
https://gitlab.com/f4T1H21/CVE-2020-7247
nomisec WORKING POC
by bytescrappers · remote
https://github.com/bytescrappers/CVE-2020-7247
metasploit WORKING POC EXCELLENT
by Qualys, wvu · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/smtp/opensmtpd_mail_from_rce.rb
exploitdb WORKING POC VERIFIED
by 1F98D · pythonremotelinux
https://www.exploit-db.com/exploits/47984
exploitdb WORKING POC VERIFIED
by Marco Ivaldi · perlremoteopenbsd
https://www.exploit-db.com/exploits/48051
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/48038
vulncheck_xdb WORKING POC
remote
https://github.com/0xdea/exploits

Nuclei Templates (1)

OpenSMTPD 6.4.0-6.6.1 - Remote Code Execution
CRITICALby princechaddha

References (15)

Scores

CVSS v3 9.8
EPSS 0.9408
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2022-03-25
VulnCheck KEV 2022-03-25
InTheWild.io 2020-01-31
ENISA EUVD EUVD-2020-28374

Classification

CWE
CWE-78 CWE-755
Status published

Affected Products (6)

openbsd/opensmtpd
debian/debian_linux
debian/debian_linux
fedoraproject/fedora
canonical/ubuntu_linux
canonical/ubuntu_linux

Timeline

Published Jan 29, 2020
KEV Added Mar 25, 2022
Tracked Since Feb 18, 2026