Skip to content

Argument injection in sendmail transport

High
amousset published GHSA-vc2p-r46x-m3vx Nov 11, 2020

Package

lettre (crates.io)

Affected versions

<0.10.0-alpha.4 <0.9.5 <0.8.4 <0.7.1

Patched versions

0.10.0-alpha.4 0.9.5 0.8.4 0.7.1

Description

Impact

Affected versions of lettre allowed argument injection to the sendmail command. It was possible, using forged to addresses, to pass arbitrary arguments to the sendmail executable.

Depending on the implementation (original sendmail, postfix, exim, etc.) it could be possible in some cases to write email data into abritrary files (using sendmail's logging features).

NOTE: This vulnerability only affects the sendmail transport. Others, including smtp, are not affected.

Fix

The flaw is corrected by modifying the executed command to stop parsing arguments before passing the destination addresses.

References

Severity

High

CVE ID

CVE-2020-28247

Weaknesses

No CWEs

Credits