- Reported
-
- Issued
-
- Package
-
lettre
(crates.io)
- Type
-
Vulnerability
- Categories
-
- Keywords
-
#email
#sendmail
- Aliases
-
- References
-
- CVSS Score
- 5.3
MEDIUM
- CVSS Details
-
- Attack vector
- Network
- Attack complexity
- Low
- Privileges required
- None
- User interaction
- None
- Scope
- Unchanged
- Confidentiality
- None
- Integrity
- Low
- Availability
- None
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Patched
-
>=0.10.0-alpha.4
<0.10.0-alpha.1, >=0.9.5
<0.9.0, >=0.8.4
<0.8.0, >=0.7.1
- Unaffected
-
- Affected Functions
- Version
lettre::sendmail::SendmailTransport::send
-
lettre::transport::sendmail::SendmailTransport::send
-
>=0.10.0-alpha.1, <=0.10.0-alpha.3
lettre::transport::sendmail::SendmailTransport::send_raw
-
>=0.10.0-alpha.1, <=0.10.0-alpha.3
Description
Affected versions of lettre allowed argument injection
to the sendmail command. It was possible, using forged to
addresses,
to pass arbitrary arguments to the sendmail executable.
Depending on the implementation (original sendmail, postfix, exim, etc.)
it could be possible in some cases to write email data into arbitrary files (using sendmail's
logging features).
The flaw is corrected by modifying the executed command to stop parsing arguments
before passing the destination addresses.
NOTE: This vulnerability only affects the sendmail
transport. Others, including smtp
, are not
affected.
This vulnerability was reported by vin01.
Advisory available under CC0-1.0
license.