CVE-2020-7247
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 20, 2020
- Published Date
- January 29, 2020
- Last Updated
- February 04, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-03-25 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/smtp/opensmtpd_mail_from_rce.rb | 2025-04-29 11:01:27 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2020/CVE-2020-7247.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
opensmtpd_mail_from_rce
Type: metasploit • Created: Unknown
SimonSchoeni/CVE-2020-7247-POC
Type: github • Created: 2021-11-26 17:28:56 UTC • Stars: 2
f4T1H21/CVE-2020-7247
Type: github • Created: 2021-06-19 07:34:42 UTC • Stars: 2
bytescrappers/CVE-2020-7247
Type: github • Created: 2021-06-02 12:02:33 UTC • Stars: 0
QTranspose/CVE-2020-7247-exploit
Type: github • Created: 2021-02-13 06:57:47 UTC • Stars: 11
r0lh/CVE-2020-7247
Type: github • Created: 2020-02-18 10:52:38 UTC • Stars: 3