Exim with Dovecot use_shell Command Injection

medium Nessus Plugin ID 66373
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A mail transfer agent running on the remote host has a shell command injection vulnerability.

Description

The remote MTA (which appears to be Exim) has a shell command execution vulnerability. Dovecot is commonly used as a local delivery agent for Exim. The Dovecot documentation has an insecure example for how to configure Exim using the 'use_shell' option. If a host is using this configuration, it is vulnerable to command injection.

A remote, unauthenticated attacker could exploit this by sending an email to the MTA, resulting in arbitrary shell command execution.

Solution

Remove the 'use_shell' option from the Exim configuration file. Refer to the advisory for more information.

See Also

http://www.nessus.org/u?59f1529f

Plugin Details

Severity: Medium

ID: 66373

File Name: exim_use_shell_rce.nasl

Version: 1.10

Type: remote

Published: 5/10/2013

Updated: 3/6/2019

Dependencies: smtpserver_detect.nasl

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:exim:exim, cpe:/a:dovecot:dovecot

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 5/3/2013

Exploitable With

Metasploit (Exim and Dovecot Insecure Configuration Command Injection)

Reference Information

BID: 60465

EDB-ID: 25297, 25970