Project

General

Profile

Actions

Bug #32753

closed

CVE-2021-3584: Remote code execution through Sendmail configuration

Added by Lukas Zapletal almost 3 years ago. Updated almost 3 years ago.

Status:
Closed
Priority:
High
Category:
Settings
Target version:
Difficulty:
easy
Triaged:
Yes
Fixed in Releases:
Found in Releases:

Description

Sendmail location and arguments, available via Administer - Settings,
both accept arbitrary strings and pass them into shell.
By default, only Foreman super administrator can access settings.

Mitigation: Verify the both settings and remove edit_settings
permissions to all roles and users until fixed. Alternatively, create
settings named sendmail_location and sendmail_arguments in settings.yaml
file to override the UI and make the values read-only.

Solution: Limit the possible values for location to just expected paths.
Use shellescaping for arguments as there is currently no way to pass
arguments to the 'mail' gem in a safely manner.


Files

sendmail-32753-a.patch sendmail-32753-a.patch 3.38 KB Lukas Zapletal, 06/09/2021 06:57 AM
sendmail-32753-b.patch sendmail-32753-b.patch 4.52 KB Lukas Zapletal, 06/10/2021 01:32 PM

Related issues 1 (0 open1 closed)

Related to Installer - Bug #32827: Set sendmail location and arguments via puppet/installerClosedEwoud Kohl van WijngaardenActions
Actions

Also available in: Atom PDF