Unauthenticated OS Command Injection in stamparm/maltrail in stamparm/maltrail
Reported on
Feb 24th 2023
Description
Maltrail <= v0.54 is vulnerable to unauthenticated OS command injection during the login process.
Summary
The subprocess.check_output
function in mailtrail/core/http.py contains a command injection vulnerability in the params.get("username")
parameter.
An attacker can exploit this vulnerability by injecting arbitrary OS commands into the username parameter. The injected commands will be executed with the privileges of the running process. This vulnerability can be exploited remotely without authentication.
Proof of Concept
curl 'http://hostname:8338/login' \
--data 'username=;`id > /tmp/bbq`'
Impact
Arbitrary command execution
Occurrences
SECURITY.md
9 months ago
@admin
I reached out to the maintainer via email. He validated the vulnerability and committed a fix. https://github.com/stamparm/maltrail/commit/a299967318cc226c18a6a07d1be708e3f21edd39
I have validated the report but we will need maintainer validation on the fix as this repository is eligible for a CVE.
Would you rather we published without a CVE or do you want to wait for the maintainer @Chris?