vendor:
Qmail
by:
1F98D
9.8
CVSS
CRITICAL
Shellshock vulnerability
78
CWE
Product Name: Qmail
Affected Version From: Qmail 1.03
Affected Version To: Qmail 1.03
Patch Exists: YES
Related CWE: CVE-2014-6271
CPE: a:qmail:qmail
Metasploit:
https://www.rapid7.com/db/vulnerabilities/freebsd-vid-81e2b308-4a6c-11e4-b711-6805ca0b3d42/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/ubuntu-USN-2380-1/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3093/, https://www.rapid7.com/db/vulnerabilities/gnu-bash-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3092/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/pulse-secure-pulse-connect-secure-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-512d1301-49b9-11e4-ae2c-c80aa9043978/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-ELSA-2014-3094/, https://www.rapid7.com/db/vulnerabilities/cisco-xe-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2014-1354/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2014-6278/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/hpsim-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/apple-osx-bash-cve-2014-6277/, https://www.rapid7.com/db/vulnerabilities/cisco-xe-cve-2014-6277/, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=2, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=3, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=4, https://www.rapid7.com/db/?q=CVE-2014-6271&type=&page=2
Other Scripts:
N/A
Platforms Tested: Debian 9.11 (x64)
2020
Qmail SMTP 1.03 – Bash Environment Variable Injection
Qmail is vulnerable to a Shellshock vulnerability due to lack of validation in the MAIL FROM field. An attacker can exploit this vulnerability by sending a malicious payload in the MAIL FROM field, which will be executed on the target system.
Mitigation:
Validate the MAIL FROM field to prevent malicious payloads from being executed.