RUSTSEC-2020-0069

Source
https://rustsec.org/advisories/RUSTSEC-2020-0069
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2020-0069.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2020-0069
Aliases
Published
2020-11-11T12:00:00Z
Modified
2023-11-08T04:03:24.160094Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
Argument injection in sendmail transport
Details

Affected versions of lettre allowed argument injection to the sendmail command. It was possible, using forged to addresses, to pass arbitrary arguments to the sendmail executable.

Depending on the implementation (original sendmail, postfix, exim, etc.) it could be possible in some cases to write email data into arbitrary files (using sendmail's logging features).

The flaw is corrected by modifying the executed command to stop parsing arguments before passing the destination addresses.

NOTE: This vulnerability only affects the sendmail transport. Others, including smtp, are not affected.

This vulnerability was reported by vin01.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / lettre

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.7.0
Fixed
0.7.1
Introduced
0.8.0
Fixed
0.8.4
Introduced
0.9.0
Fixed
0.9.5
Introduced
0.10.0-alpha.1
Fixed
0.10.0-alpha.4

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "os": [],
        "functions": [
            "lettre::sendmail::SendmailTransport::send",
            "lettre::transport::sendmail::SendmailTransport::send",
            "lettre::transport::sendmail::SendmailTransport::send_raw"
        ],
        "arch": []
    }
}

Database specific

{
    "cvss": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
    "informational": null,
    "categories": [
        "code-execution",
        "file-disclosure"
    ]
}