An issue was discovered in Titan SpamTitan 7.07. Due to improper sanitization of the parameter quid, used in the page mailqueue.php, code injection can occur. The input for this parameter is provided directly by an authenticated user via an HTTP GET request.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159218/SpamTitan-7.07-Remote-Code-Execution.html | Exploit Third Party Advisory |
https://github.com/felmoltor | Third Party Advisory |
https://sensepost.com/blog/2020/clash-of-the-spamtitan/ | Exploit Third Party Advisory |
https://twitter.com/felmoltor | Third Party Advisory |
https://www.spamtitan.com | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-09-17T16:26:45
Updated: 2020-09-18T18:06:23
Reserved: 2020-04-15T00:00:00
Link: CVE-2020-11804
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-09-17T17:15:15.273
Modified: 2021-07-21T11:39:23.747
Link: CVE-2020-11804
JSON object: View
Redhat Information
No data.
CWE