On 2023-01-14 at 17:33 +0200, Mary wrote:
> Thank you, I'll take a closer look, because Shellshock implies that
> somehow the SMTPD executes a bash script, which I find highly
> unlikely. That is why I thought they are trying to exploit something
> further down the pipeline (Logstash, Prometheus, etc).

The command is a normal shellshock payload. It would seems to target
the case where the mail server or an MDA sets an environment variable
with the MAIL FROM value and then executes a command through bash.
This could be the execution of a milter, a procmail... courier also
extensively uses environment variables between their programs.
The most difficult part is that a bash shell is executed... being an
old version which not patched for this 2014 vulnerability.


_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to