CVE-2026-27602 | Teknoloji dünyasından en güncel haberleri ve güvenlikle ilgili gelişmeleri takip edin.

Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=Tr…
High CVSS: 7.2

CVE-2026-27602

Modoboa is a mail hosting and management platform. Prior to version 2.7.1, `exec_cmd()` in `modoboa/lib/sysutils.py` always runs subprocess calls with `shell=True`. Since domain names flow directly into shell command strings without any sanitization, a Reseller or SuperAdmin can include shell metacharacters in a domain name to run arbitrary OS commands on the server. Version 2.7.1 patches the issue.
Vendor
Modoboa
Product
Modoboa
CWE
CWE-78
Yayın Tarihi
2026-03-25 19:16:48
Güncelleme
2026-03-26 16:30:21
Source Identifier
security-advisories@github.com
KEV Date Added
-

Kategoriler

Referanslar