Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-7247
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Openbsd Opensmtpd代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Openbsd Opensmtpd是Openbsd组织的一个基于RFC 5321的SMTP服务端软件。 Openbsd Opensmtpd 存在代码问题漏洞。远程攻击者可通过特制的SMTP session利用该漏洞以root权限执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2020-7247
#POC DescriptionSource LinkShenlong Link
1Python exploit of cve-2020-7247https://github.com/FiroSolutions/cve-2020-7247-exploitPOC Details
2OpenSMTPD version 6.6.2 remote code execution exploithttps://github.com/superzerosec/cve-2020-7247POC Details
3Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2https://github.com/r0lh/CVE-2020-7247POC Details
4OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploithttps://github.com/QTranspose/CVE-2020-7247-exploitPOC Details
5This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root userhttps://github.com/bytescrappers/CVE-2020-7247POC Details
6PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Executionhttps://github.com/f4T1H21/CVE-2020-7247POC Details
7Proof of concept for CVE-2020-7247 for educational purposes.https://github.com/SimonSchoeni/CVE-2020-7247-POCPOC Details
8Worm written in python, abuses CVE-2020-7247https://github.com/presentdaypresenttime/shai_huludPOC Details
9CVE-2020-7247 Remote Code Execution POChttps://github.com/gatariee/CVE-2020-7247POC Details
10Nonehttps://github.com/minhluannguyen/CVE-2020-7247-reproducerPOC Details
11OpenSMTPD versions 6.4.0 - 6.6.1 are susceptible to remote code execution. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation. https://github.com/projectdiscovery/nuclei-templates/blob/main/javascript/cves/2020/CVE-2020-7247.yamlPOC Details
12Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/OpenSMTPD%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-7247.mdPOC Details
13https://github.com/vulhub/vulhub/blob/master/opensmtpd/CVE-2020-7247/README.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-7247
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-7247

No comments yet


Leave a comment