{"vulnerability": "CVE-2020-7247", "sightings": [{"uuid": "f145c17e-fc36-4c12-a115-9a0ec96e03a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e3423649-9a58-4653-8389-4009ce7d6d43", "content": "", "creation_timestamp": "2026-02-02T12:28:00.150441Z"}, {"uuid": "02485a2b-c3f3-4336-b6fa-c927562c5367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e3423649-9a58-4653-8389-4009ce7d6d43", "content": "", "creation_timestamp": "2026-02-02T12:28:00.150441Z"}, {"uuid": "116bcd6b-8293-46b8-becd-a49502cfcc91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/587", "content": "\ud83d\udd25 CVE-2020-7247\n\n\nA new critical vulnerability in the OpenSMTPD mail daemon could let remote attackers take complete control over vulnerable OpenBSD and Linux based e-mail servers by sending specially crafted SMTP messages.\n\n\nRead: https://thehackernews.com/2020/01/openbsd-opensmtpd-hacking.html\n\n\nPatch &amp; PoC released.", "creation_timestamp": "2020-01-30T10:23:39.000000Z"}, {"uuid": "895b2977-0aa6-44f1-9b86-db7a61285279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://t.me/xakep_ru/8656", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 OpenSMTPD \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0441 root-\u043f\u0440\u0430\u0432\u0430\u043c\u0438\n\n\u0412 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 OpenSMTPD \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-7247. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u0430\u0433\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 shell-\u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root.\n\nhttps://xakep.ru/2020/01/31/opensmtpd-rce/", "creation_timestamp": "2020-01-31T09:40:08.000000Z"}, {"uuid": "e4eb33e8-0fed-4666-a0b1-2979dc5d66d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "88000e85-29f3-4253-88e0-6f8760ce6c4a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/106", "content": "CVE-2020-7247 OpenSMTPD 6.6.2 \u9060\u7a0b\u547d\u4ee4\u57f7\u884c\u6f0f\u6d1e\nhttps://short.pwnwiki.org/?c=QcshVF", "creation_timestamp": "2021-09-21T06:42:51.000000Z"}, {"uuid": "d01cd001-d660-464b-83a1-d3b326af37fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "exploited", "source": "https://www.exploit-db.com/exploits/47984", "content": "", "creation_timestamp": "2020-01-30T00:00:00.000000Z"}, {"uuid": "0bd3f98a-c218-4b4a-9aa1-517b9ebc9662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48038", "content": "", "creation_timestamp": "2020-02-10T00:00:00.000000Z"}, {"uuid": "5df2c14f-fd3b-4782-b75c-c59197ca4fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48051", "content": "", "creation_timestamp": "2020-02-11T00:00:00.000000Z"}, {"uuid": "b896b206-186b-4b85-86ab-0291a3cd2076", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971447", "content": "", "creation_timestamp": "2024-12-24T20:29:29.136182Z"}, {"uuid": "57035bda-b379-4eea-a29e-5230b4922975", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:30.000000Z"}, {"uuid": "60949ff7-fa88-4470-b01d-b1d09ea7add4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/smtp/opensmtpd_mail_from_rce.rb", "content": "", "creation_timestamp": "2020-02-07T11:54:21.000000Z"}, {"uuid": "685c49f9-e657-4832-a97c-ae6faba8d53a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7753", "content": "https://www.openwall.com/lists/oss-security/2020/01/28/3\nCVE-2020-7247 : LPE and RCE in OpenSMTPD(OpenBSD's mail server)", "creation_timestamp": "2020-01-29T14:51:09.000000Z"}, {"uuid": "326df76a-f598-4b9e-9759-c89692f4c48a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://t.me/ctinow/19859", "content": "Critical OpenSMTPD Bug Opens Linux and OpenBSD Mail Servers to Hackers Cybersecurity researchers have discovered a new critical vulnerability (CVE-2020-7247) in the OpenSMTPD email server that could allow remote attackers to take complete control over BSD and many Linux based servers.\n\nOpenSMTPD is an open-source implementation of the server-side SMTP protocol that was initially developed as part of the OpenBSD project but now comes pre-installed on many", "creation_timestamp": "2020-01-30T10:13:23.000000Z"}, {"uuid": "2fdde241-e7b4-44fb-9e55-468ccecb6f75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://t.me/arpsyndicate/1144", "content": "#ExploitObserverAlert\n\nCVE-2020-7247\n\nDESCRIPTION: Exploit Observer has 53 entries related to CVE-2020-7247. smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the \"uncommented\" default configuration. The issue exists because of an incorrect return value upon failure of input validation.\n\nFIRST-EPSS: 0.975080000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-04T07:17:47.000000Z"}, {"uuid": "5891a57b-58e0-40d7-84ba-0cc3c98df684", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "https://t.me/SecLabNews/6743", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Qualys Security \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0432 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 OpenSMTPD \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-7247), \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c shell-\u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0441\u0443\u043f\u0435\u0440\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.    \n\u0412 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435 OpenSMTPD \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-01-29T10:40:02.000000Z"}, {"uuid": "cc32e00d-e9bd-46cd-8fdb-ff9497e48fc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/557", "content": "#exploit\n1. Cable Haunt vulnerability:\nSagemcom Fast 3890 Exploit (Firmware &gt;=50.10.21)\nhttps://github.com/Lyrebirds/sagemcom-fast-3890-exploit\n\n2. CVE-2020-7247:\nLPE/RCE Vulnerability in OpenSMTPD\nhttps://www.openwall.com/lists/oss-security/2020/01/28/3\n]-&gt; https://www.exploit-db.com/exploits/48038", "creation_timestamp": "2024-10-14T22:01:01.000000Z"}, {"uuid": "8b6b4464-1731-4958-927b-127a550ab494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "cbf5b93b-2092-497a-b928-150d4bdd141b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-7247", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:27.000000Z"}]}